Prerrequisitos
The adversary must have obtained logical access to the system by some means (e.g., via obtained credentials or planting malware on the system).
Habilidades requeridas
Once the adversary has logical access (which can potentially require high knowledge and skill level), the adversary needs only to leverage the relevant command for screen capture.
Recursos requeridos
None: No specialized resources are required to execute this type of attack.
Mitigaciones
Identify potentially malicious software that may have functionality to acquire screen captures, and audit and/or block it by using allowlist tools.
While screen capture is a legitimate and practical function, certain situations and context may require the disabling of this feature.
Debilidades relacionadas
| CWE-ID |
Nombre de la debilidad |
|
Privilege Defined With Unsafe Actions A particular privilege, role, capability, or right can be used to perform unsafe actions that were not intended, even when it is assigned to the correct entity. |
Envío
| Nombre |
Organización |
Fecha |
Fecha de lanzamiento |
| CAPEC Content Team |
|
2018-07-31 +00:00 |
|
Modificaciones
| Nombre |
Organización |
Fecha |
Comentario |
| CAPEC Content Team |
The MITRE Corporation |
2019-09-30 +00:00 |
Updated Related_Attack_Patterns |
| CAPEC Content Team |
The MITRE Corporation |
2020-07-30 +00:00 |
Updated Mitigations, Related_Attack_Patterns |
| CAPEC Content Team |
The MITRE Corporation |
2022-09-29 +00:00 |
Updated Taxonomy_Mappings |