[Determine target system] The adversary must first determine the system they wish to target. This attack only works on Windows.
[Gain access to the system] The adversary needs to gain access to the system in some way so that they can modify the Windows registry.
[Modify Windows registry] The adversary will modify the Windows registry by adding a new entry to the "run keys" referencing a desired program. This program will be run whenever the user logs in.
Nom de la faiblesse | |
---|---|
CWE-15 |
External Control of System or Configuration Setting One or more system settings or configuration elements can be externally controlled by a user. |
Nom | Organisation | Date | Date de publication |
---|---|---|---|
CAPEC Content Team | The MITRE Corporation |
Nom | Organisation | Date | Commentaire |
---|---|---|---|
CAPEC Content Team | The MITRE Corporation | Updated References | |
CAPEC Content Team | The MITRE Corporation | Updated Attack_Motivation-Consequences, Attack_Prerequisites, Description Summary, Examples-Instances, Solutions_and_Mitigations, Typical_Likelihood_of_Exploit, Typical_Severity | |
CAPEC Content Team | The MITRE Corporation | Updated Related_Weaknesses | |
CAPEC Content Team | The MITRE Corporation | Updated Description, Mitigations, Taxonomy_Mappings | |
CAPEC Content Team | The MITRE Corporation | Updated Description, Execution_Flow, Related_Attack_Patterns | |
CAPEC Content Team | The MITRE Corporation | Updated Taxonomy_Mappings |