CAPEC-646

Peripheral Footprinting
Niski
Średni
Stable
2018-07-31
00h00 +00:00
2020-07-30
00h00 +00:00
Alert dla konkretnego CAPEC
Bądź na bieżąco z wszelkimi zmianami dotyczącymi konkretnego CAPEC.
Zarządzaj powiadomieniami

Opisy CAPEC

Adversaries may attempt to obtain information about attached peripheral devices and components connected to a computer system. Examples may include discovering the presence of iOS devices by searching for backups, analyzing the Windows registry to determine what USB devices have been connected, or infecting a victim system with malware to report when a USB device has been connected. This may allow the adversary to gain additional insight about the system or network environment, which may be useful in constructing further attacks.

Informacje CAPEC

Wymagania wstępne

The adversary needs either physical or remote access to the victim system.

Wymagane umiejętności

The adversary needs to be able to infect the victim system in a manner that gives them remote access.
If analyzing the Windows registry, the adversary must understand the registry structure to know where to look for devices.

Łagodzenie

Identify programs that may be used to acquire peripheral information and block them by using a software restriction policy or tools that restrict program execution by using a process allowlist.

Powiązane słabości

CWE-ID Nazwa słabości

CWE-200

Exposure of Sensitive Information to an Unauthorized Actor
The product exposes sensitive information to an actor that is not explicitly authorized to have access to that information.

Zgłoszenie

Nazwa Organizacja Data Data wydania
CAPEC Content Team 2018-07-31 +00:00

Modyfikacje

Nazwa Organizacja Data Komentarz
CAPEC Content Team The MITRE Corporation 2019-04-04 +00:00 Updated Related_Attack_Patterns
CAPEC Content Team The MITRE Corporation 2019-09-30 +00:00 Updated @Abstraction
CAPEC Content Team The MITRE Corporation 2020-07-30 +00:00 Updated Mitigations, Skills_Required