CAPEC-191

Read Sensitive Constants Within an Executable
Laag
Draft
2014-06-23
00h00 +00:00
2022-02-22
00h00 +00:00
Melding voor een CAPEC
Blijf op de hoogte van wijzigingen voor een specifieke CAPEC.
Meldingen beheren

Informatie CAPEC

Vereisten

Access to a binary or executable such that it can be analyzed by various utilities.

Vereiste middelen

Binary analysis programs such as 'strings' or 'grep', or hex editors.

Gerelateerde zwakheden

CWE-ID Zwakheidsnaam

CWE-798

Use of Hard-coded Credentials
The product contains hard-coded credentials, such as a password or cryptographic key.

Referenties

REF-51

Wikipedia
http://en.wikipedia.org/wiki/Decompiler

REF-52

Wikipedia
http://en.wikipedia.org/wiki/Debugger

REF-53

Wikipedia
http://en.wikipedia.org/wiki/Disassembler

Indiening

Naam Organisatie Datum Releasedatum
CAPEC Content Team The MITRE Corporation 2014-06-23 +00:00

Wijzigingen

Naam Organisatie Datum Opmerking
CAPEC Content Team The MITRE Corporation 2015-11-09 +00:00 Updated Description Summary, Other_Notes, References, Related_Attack_Patterns, Resources_Required
CAPEC Content Team The MITRE Corporation 2017-08-04 +00:00 Updated Attack_Prerequisites, Description Summary, Resources_Required
CAPEC Content Team The MITRE Corporation 2019-04-04 +00:00 Updated Related_Weaknesses
CAPEC Content Team The MITRE Corporation 2020-07-30 +00:00 Updated @Name, Description, Related_Attack_Patterns, Taxonomy_Mappings
CAPEC Content Team The MITRE Corporation 2022-02-22 +00:00 Updated Description, Extended_Description