Vereisten
Access to a binary or executable such that it can be analyzed by various utilities.
Vereiste middelen
Binary analysis programs such as 'strings' or 'grep', or hex editors.
Gerelateerde zwakheden
| CWE-ID |
Zwakheidsnaam |
|
Use of Hard-coded Credentials The product contains hard-coded credentials, such as a password or cryptographic key. |
Referenties
REF-51
Wikipedia
http://en.wikipedia.org/wiki/Decompiler REF-52
Wikipedia
http://en.wikipedia.org/wiki/Debugger REF-53
Wikipedia
http://en.wikipedia.org/wiki/Disassembler
Indiening
| Naam |
Organisatie |
Datum |
Releasedatum |
| CAPEC Content Team |
The MITRE Corporation |
2014-06-23 +00:00 |
|
Wijzigingen
| Naam |
Organisatie |
Datum |
Opmerking |
| CAPEC Content Team |
The MITRE Corporation |
2015-11-09 +00:00 |
Updated Description Summary, Other_Notes, References, Related_Attack_Patterns, Resources_Required |
| CAPEC Content Team |
The MITRE Corporation |
2017-08-04 +00:00 |
Updated Attack_Prerequisites, Description Summary, Resources_Required |
| CAPEC Content Team |
The MITRE Corporation |
2019-04-04 +00:00 |
Updated Related_Weaknesses |
| CAPEC Content Team |
The MITRE Corporation |
2020-07-30 +00:00 |
Updated @Name, Description, Related_Attack_Patterns, Taxonomy_Mappings |
| CAPEC Content Team |
The MITRE Corporation |
2022-02-22 +00:00 |
Updated Description, Extended_Description |