Wymagania wstępne
The adversary needs either physical or remote access to the victim system.
Wymagane umiejętności
The adversary needs to be able to infect the victim system in a manner that gives them remote access.
If analyzing the Windows registry, the adversary must understand the registry structure to know where to look for devices.
Łagodzenie
Identify programs that may be used to acquire peripheral information and block them by using a software restriction policy or tools that restrict program execution by using a process allowlist.
Powiązane słabości
| CWE-ID |
Nazwa słabości |
|
Exposure of Sensitive Information to an Unauthorized Actor The product exposes sensitive information to an actor that is not explicitly authorized to have access to that information. |
Zgłoszenie
| Nazwa |
Organizacja |
Data |
Data wydania |
| CAPEC Content Team |
|
2018-07-31 +00:00 |
|
Modyfikacje
| Nazwa |
Organizacja |
Data |
Komentarz |
| CAPEC Content Team |
The MITRE Corporation |
2019-04-04 +00:00 |
Updated Related_Attack_Patterns |
| CAPEC Content Team |
The MITRE Corporation |
2019-09-30 +00:00 |
Updated @Abstraction |
| CAPEC Content Team |
The MITRE Corporation |
2020-07-30 +00:00 |
Updated Mitigations, Skills_Required |