Prerrequisitos
The adversary needs either physical or remote access to the victim system.
Habilidades requeridas
The adversary needs to be able to infect the victim system in a manner that gives them remote access.
If analyzing the Windows registry, the adversary must understand the registry structure to know where to look for devices.
Mitigaciones
Identify programs that may be used to acquire peripheral information and block them by using a software restriction policy or tools that restrict program execution by using a process allowlist.
Debilidades relacionadas
| CWE-ID |
Nombre de la debilidad |
|
Exposure of Sensitive Information to an Unauthorized Actor The product exposes sensitive information to an actor that is not explicitly authorized to have access to that information. |
Envío
| Nombre |
Organización |
Fecha |
Fecha de lanzamiento |
| CAPEC Content Team |
|
2018-07-31 +00:00 |
|
Modificaciones
| Nombre |
Organización |
Fecha |
Comentario |
| CAPEC Content Team |
The MITRE Corporation |
2019-04-04 +00:00 |
Updated Related_Attack_Patterns |
| CAPEC Content Team |
The MITRE Corporation |
2019-09-30 +00:00 |
Updated @Abstraction |
| CAPEC Content Team |
The MITRE Corporation |
2020-07-30 +00:00 |
Updated Mitigations, Skills_Required |