NaifAlzanki/kwCyber-AI-Agent
Text Generation โข Updated
instruction stringlengths 20 156 | context stringclasses 37
values | response stringlengths 73 869 | category stringclasses 11
values | language stringclasses 2
values | difficulty stringclasses 4
values | source stringclasses 8
values | id stringlengths 14 14 |
|---|---|---|---|---|---|---|---|
What is Accessing Functionality Not Properly Constrained by ACLs (CAPEC-1) attack pattern? | CAPEC | Accessing Functionality Not Properly Constrained by ACLs (CAPEC-1): In applications, particularly web applications, access to functionality is mitigated by an authorization framework. This framework maps Access Control Lists (ACLs) to elements of the application's functionality; particularly URL's for web apps. In the ... | web_security | en | intermediate | capec | kwcyber_000000 |
ู
ุง ูู ูู
ุท ุงููุฌูู
Accessing Functionality Not Properly Constrained by ACLs (CAPEC-1)ุ | CAPEC | ูู
ุท ุงููุฌูู
Accessing Functionality Not Properly Constrained by ACLs (CAPEC-1): In applications, particularly web applications, access to functionality is mitigated by an authorization framework. This framework maps Access Control Lists (ACLs) to elements of the application's functionality; particularly URL's for web ap... | web_security | ar | intermediate | capec | kwcyber_000001 |
How does Accessing Functionality Not Properly Constrained by ACLs attack work? | Attack Analysis | Technical analysis of Accessing Functionality Not Properly Constrained by ACLs (CAPEC-1): In applications, particularly web applications, access to functionality is mitigated by an authorization framework. This framework maps Access Control Lists (ACLs) to elements of the application's functionality; particularly URL's... | web_security | en | advanced | capec | kwcyber_000002 |
What is Buffer Overflow via Environment Variables (CAPEC-10) attack pattern? | CAPEC | Buffer Overflow via Environment Variables (CAPEC-10): This attack pattern involves causing a buffer overflow through manipulation of environment variables. Once the adversary finds that they can modify an environment variable, they may try to overflow associated buffers. This attack leverages implicit trust often place... | web_security | en | intermediate | capec | kwcyber_000003 |
ู
ุง ูู ูู
ุท ุงููุฌูู
Buffer Overflow via Environment Variables (CAPEC-10)ุ | CAPEC | ูู
ุท ุงููุฌูู
Buffer Overflow via Environment Variables (CAPEC-10): This attack pattern involves causing a buffer overflow through manipulation of environment variables. Once the adversary finds that they can modify an environment variable, they may try to overflow associated buffers. This attack leverages implicit trust ... | web_security | ar | intermediate | capec | kwcyber_000004 |
How does Buffer Overflow via Environment Variables attack work? | Attack Analysis | Technical analysis of Buffer Overflow via Environment Variables (CAPEC-10): This attack pattern involves causing a buffer overflow through manipulation of environment variables. Once the adversary finds that they can modify an environment variable, they may try to overflow associated buffers. This attack leverages impl... | web_security | en | advanced | capec | kwcyber_000005 |
What is Overflow Buffers (CAPEC-100) attack pattern? | CAPEC | Overflow Buffers (CAPEC-100): Buffer Overflow attacks target improper or missing bounds checking on buffer operations, typically triggered by input injected by an adversary. As a consequence, an adversary is able to write past the boundaries of allocated buffer regions in memory, causing a program crash or potentially ... | web_security | en | intermediate | capec | kwcyber_000006 |
ู
ุง ูู ูู
ุท ุงููุฌูู
Overflow Buffers (CAPEC-100)ุ | CAPEC | ูู
ุท ุงููุฌูู
Overflow Buffers (CAPEC-100): Buffer Overflow attacks target improper or missing bounds checking on buffer operations, typically triggered by input injected by an adversary. As a consequence, an adversary is able to write past the boundaries of allocated buffer regions in memory, causing a program crash or p... | web_security | ar | intermediate | capec | kwcyber_000007 |
How does Overflow Buffers attack work? | Attack Analysis | Technical analysis of Overflow Buffers (CAPEC-100): Buffer Overflow attacks target improper or missing bounds checking on buffer operations, typically triggered by input injected by an adversary. As a consequence, an adversary is able to write past the boundaries of allocated buffer regions in memory, causing a program... | web_security | en | advanced | capec | kwcyber_000008 |
What is Server Side Include (SSI) Injection (CAPEC-101) attack pattern? | CAPEC | Server Side Include (SSI) Injection (CAPEC-101): An attacker can use Server Side Include (SSI) Injection to send code to a web application that then gets executed by the web server. Doing so enables the attacker to achieve similar results to Cross Site Scripting, viz., arbitrary code execution and information disclosur... | web_security | en | intermediate | capec | kwcyber_000009 |
ู
ุง ูู ูู
ุท ุงููุฌูู
Server Side Include (SSI) Injection (CAPEC-101)ุ | CAPEC | ูู
ุท ุงููุฌูู
Server Side Include (SSI) Injection (CAPEC-101): An attacker can use Server Side Include (SSI) Injection to send code to a web application that then gets executed by the web server. Doing so enables the attacker to achieve similar results to Cross Site Scripting, viz., arbitrary code execution and informatio... | web_security | ar | intermediate | capec | kwcyber_000010 |
How does Server Side Include (SSI) Injection attack work? | Attack Analysis | Technical analysis of Server Side Include (SSI) Injection (CAPEC-101): An attacker can use Server Side Include (SSI) Injection to send code to a web application that then gets executed by the web server. Doing so enables the attacker to achieve similar results to Cross Site Scripting, viz., arbitrary code execution and... | web_security | en | advanced | capec | kwcyber_000011 |
What is Session Sidejacking (CAPEC-102) attack pattern? | CAPEC | Session Sidejacking (CAPEC-102): Session sidejacking takes advantage of an unencrypted communication channel between a victim and target system. The attacker sniffs traffic on a network looking for session tokens in unencrypted traffic. Once a session token is captured, the attacker performs malicious actions by using ... | web_security | en | intermediate | capec | kwcyber_000012 |
ู
ุง ูู ูู
ุท ุงููุฌูู
Session Sidejacking (CAPEC-102)ุ | CAPEC | ูู
ุท ุงููุฌูู
Session Sidejacking (CAPEC-102): Session sidejacking takes advantage of an unencrypted communication channel between a victim and target system. The attacker sniffs traffic on a network looking for session tokens in unencrypted traffic. Once a session token is captured, the attacker performs malicious action... | web_security | ar | intermediate | capec | kwcyber_000013 |
How does Session Sidejacking attack work? | Attack Analysis | Technical analysis of Session Sidejacking (CAPEC-102): Session sidejacking takes advantage of an unencrypted communication channel between a victim and target system. The attacker sniffs traffic on a network looking for session tokens in unencrypted traffic. Once a session token is captured, the attacker performs malic... | web_security | en | advanced | capec | kwcyber_000014 |
What is Clickjacking (CAPEC-103) attack pattern? | CAPEC | Clickjacking (CAPEC-103): An adversary tricks a victim into unknowingly initiating some action in one system while interacting with the UI from a seemingly completely different, usually an adversary controlled or intended, system. | web_security | en | intermediate | capec | kwcyber_000015 |
ู
ุง ูู ูู
ุท ุงููุฌูู
Clickjacking (CAPEC-103)ุ | CAPEC | ูู
ุท ุงููุฌูู
Clickjacking (CAPEC-103): An adversary tricks a victim into unknowingly initiating some action in one system while interacting with the UI from a seemingly completely different, usually an adversary controlled or intended, system. | web_security | ar | intermediate | capec | kwcyber_000016 |
How does Clickjacking attack work? | Attack Analysis | Technical analysis of Clickjacking (CAPEC-103): An adversary tricks a victim into unknowingly initiating some action in one system while interacting with the UI from a seemingly completely different, usually an adversary controlled or intended, system. | web_security | en | advanced | capec | kwcyber_000017 |
What is Cross Zone Scripting (CAPEC-104) attack pattern? | CAPEC | Cross Zone Scripting (CAPEC-104): An attacker is able to cause a victim to load content into their web-browser that bypasses security zone controls and gain access to increased privileges to execute scripting code or other web objects such as unsigned ActiveX controls or applets. This is a privilege elevation attack ta... | web_security | en | intermediate | capec | kwcyber_000018 |
ู
ุง ูู ูู
ุท ุงููุฌูู
Cross Zone Scripting (CAPEC-104)ุ | CAPEC | ูู
ุท ุงููุฌูู
Cross Zone Scripting (CAPEC-104): An attacker is able to cause a victim to load content into their web-browser that bypasses security zone controls and gain access to increased privileges to execute scripting code or other web objects such as unsigned ActiveX controls or applets. This is a privilege elevatio... | web_security | ar | intermediate | capec | kwcyber_000019 |
How does Cross Zone Scripting attack work? | Attack Analysis | Technical analysis of Cross Zone Scripting (CAPEC-104): An attacker is able to cause a victim to load content into their web-browser that bypasses security zone controls and gain access to increased privileges to execute scripting code or other web objects such as unsigned ActiveX controls or applets. This is a privile... | web_security | en | advanced | capec | kwcyber_000020 |
What is HTTP Request Splitting (CAPEC-105) attack pattern? | CAPEC | HTTP Request Splitting (CAPEC-105): <xhtml:p>An adversary abuses the flexibility and discrepancies in the parsing and interpretation of HTTP Request messages by different intermediary HTTP agents (e.g., load balancer, reverse proxy, web caching proxies, application firewalls, etc.) to split a single HTTP request into m... | web_security | en | intermediate | capec | kwcyber_000021 |
ู
ุง ูู ูู
ุท ุงููุฌูู
HTTP Request Splitting (CAPEC-105)ุ | CAPEC | ูู
ุท ุงููุฌูู
HTTP Request Splitting (CAPEC-105): <xhtml:p>An adversary abuses the flexibility and discrepancies in the parsing and interpretation of HTTP Request messages by different intermediary HTTP agents (e.g., load balancer, reverse proxy, web caching proxies, application firewalls, etc.) to split a single HTTP req... | web_security | ar | intermediate | capec | kwcyber_000022 |
How does HTTP Request Splitting attack work? | Attack Analysis | Technical analysis of HTTP Request Splitting (CAPEC-105): <xhtml:p>An adversary abuses the flexibility and discrepancies in the parsing and interpretation of HTTP Request messages by different intermediary HTTP agents (e.g., load balancer, reverse proxy, web caching proxies, application firewalls, etc.) to split a sing... | web_security | en | advanced | capec | kwcyber_000023 |
What is DEPRECATED: XSS through Log Files (CAPEC-106) attack pattern? | CAPEC | DEPRECATED: XSS through Log Files (CAPEC-106): This attack pattern has been deprecated as it referes to an existing chain relationship between "CAPEC-93 : Log Injection-Tampering-Forging" and "CAPEC-63 : Cross-Site Scripting". Please refer to these CAPECs going forward. | web_security | en | intermediate | capec | kwcyber_000024 |
ู
ุง ูู ูู
ุท ุงููุฌูู
DEPRECATED: XSS through Log Files (CAPEC-106)ุ | CAPEC | ูู
ุท ุงููุฌูู
DEPRECATED: XSS through Log Files (CAPEC-106): This attack pattern has been deprecated as it referes to an existing chain relationship between "CAPEC-93 : Log Injection-Tampering-Forging" and "CAPEC-63 : Cross-Site Scripting". Please refer to these CAPECs going forward. | web_security | ar | intermediate | capec | kwcyber_000025 |
How does DEPRECATED: XSS through Log Files attack work? | Attack Analysis | Technical analysis of DEPRECATED: XSS through Log Files (CAPEC-106): This attack pattern has been deprecated as it referes to an existing chain relationship between "CAPEC-93 : Log Injection-Tampering-Forging" and "CAPEC-63 : Cross-Site Scripting". Please refer to these CAPECs going forward. | web_security | en | advanced | capec | kwcyber_000026 |
What is Cross Site Tracing (CAPEC-107) attack pattern? | CAPEC | Cross Site Tracing (CAPEC-107): Cross Site Tracing (XST) enables an adversary to steal the victim's session cookie and possibly other authentication credentials transmitted in the header of the HTTP request when the victim's browser communicates to a destination system's web server. | web_security | en | intermediate | capec | kwcyber_000027 |
ู
ุง ูู ูู
ุท ุงููุฌูู
Cross Site Tracing (CAPEC-107)ุ | CAPEC | ูู
ุท ุงููุฌูู
Cross Site Tracing (CAPEC-107): Cross Site Tracing (XST) enables an adversary to steal the victim's session cookie and possibly other authentication credentials transmitted in the header of the HTTP request when the victim's browser communicates to a destination system's web server. | web_security | ar | intermediate | capec | kwcyber_000028 |
How does Cross Site Tracing attack work? | Attack Analysis | Technical analysis of Cross Site Tracing (CAPEC-107): Cross Site Tracing (XST) enables an adversary to steal the victim's session cookie and possibly other authentication credentials transmitted in the header of the HTTP request when the victim's browser communicates to a destination system's web server. | web_security | en | advanced | capec | kwcyber_000029 |
What is Command Line Execution through SQL Injection (CAPEC-108) attack pattern? | CAPEC | Command Line Execution through SQL Injection (CAPEC-108): An attacker uses standard SQL injection methods to inject data into the command line for execution. This could be done directly through misuse of directives such as MSSQL_xp_cmdshell or indirectly through injection of data into the database that would be interpr... | web_security | en | intermediate | capec | kwcyber_000030 |
ู
ุง ูู ูู
ุท ุงููุฌูู
Command Line Execution through SQL Injection (CAPEC-108)ุ | CAPEC | ูู
ุท ุงููุฌูู
Command Line Execution through SQL Injection (CAPEC-108): An attacker uses standard SQL injection methods to inject data into the command line for execution. This could be done directly through misuse of directives such as MSSQL_xp_cmdshell or indirectly through injection of data into the database that would... | web_security | ar | intermediate | capec | kwcyber_000031 |
How does Command Line Execution through SQL Injection attack work? | Attack Analysis | Technical analysis of Command Line Execution through SQL Injection (CAPEC-108): An attacker uses standard SQL injection methods to inject data into the command line for execution. This could be done directly through misuse of directives such as MSSQL_xp_cmdshell or indirectly through injection of data into the database... | web_security | en | advanced | capec | kwcyber_000032 |
What is Object Relational Mapping Injection (CAPEC-109) attack pattern? | CAPEC | Object Relational Mapping Injection (CAPEC-109): An attacker leverages a weakness present in the database access layer code generated with an Object Relational Mapping (ORM) tool or a weakness in the way that a developer used a persistence framework to inject their own SQL commands to be executed against the underlying... | web_security | en | intermediate | capec | kwcyber_000033 |
ู
ุง ูู ูู
ุท ุงููุฌูู
Object Relational Mapping Injection (CAPEC-109)ุ | CAPEC | ูู
ุท ุงููุฌูู
Object Relational Mapping Injection (CAPEC-109): An attacker leverages a weakness present in the database access layer code generated with an Object Relational Mapping (ORM) tool or a weakness in the way that a developer used a persistence framework to inject their own SQL commands to be executed against the... | web_security | ar | intermediate | capec | kwcyber_000034 |
How does Object Relational Mapping Injection attack work? | Attack Analysis | Technical analysis of Object Relational Mapping Injection (CAPEC-109): An attacker leverages a weakness present in the database access layer code generated with an Object Relational Mapping (ORM) tool or a weakness in the way that a developer used a persistence framework to inject their own SQL commands to be executed ... | web_security | en | advanced | capec | kwcyber_000035 |
What is Cause Web Server Misclassification (CAPEC-11) attack pattern? | CAPEC | Cause Web Server Misclassification (CAPEC-11): An attack of this type exploits a Web server's decision to take action based on filename or file extension. Because different file types are handled by different server processes, misclassification may force the Web server to take unexpected action, or expected actions in ... | web_security | en | intermediate | capec | kwcyber_000036 |
ู
ุง ูู ูู
ุท ุงููุฌูู
Cause Web Server Misclassification (CAPEC-11)ุ | CAPEC | ูู
ุท ุงููุฌูู
Cause Web Server Misclassification (CAPEC-11): An attack of this type exploits a Web server's decision to take action based on filename or file extension. Because different file types are handled by different server processes, misclassification may force the Web server to take unexpected action, or expected ... | web_security | ar | intermediate | capec | kwcyber_000037 |
How does Cause Web Server Misclassification attack work? | Attack Analysis | Technical analysis of Cause Web Server Misclassification (CAPEC-11): An attack of this type exploits a Web server's decision to take action based on filename or file extension. Because different file types are handled by different server processes, misclassification may force the Web server to take unexpected action, o... | web_security | en | advanced | capec | kwcyber_000038 |
What is SQL Injection through SOAP Parameter Tampering (CAPEC-110) attack pattern? | CAPEC | SQL Injection through SOAP Parameter Tampering (CAPEC-110): An attacker modifies the parameters of the SOAP message that is sent from the service consumer to the service provider to initiate a SQL injection attack. On the service provider side, the SOAP message is parsed and parameters are not properly validated before... | web_security | en | intermediate | capec | kwcyber_000039 |
ู
ุง ูู ูู
ุท ุงููุฌูู
SQL Injection through SOAP Parameter Tampering (CAPEC-110)ุ | CAPEC | ูู
ุท ุงููุฌูู
SQL Injection through SOAP Parameter Tampering (CAPEC-110): An attacker modifies the parameters of the SOAP message that is sent from the service consumer to the service provider to initiate a SQL injection attack. On the service provider side, the SOAP message is parsed and parameters are not properly valid... | web_security | ar | intermediate | capec | kwcyber_000040 |
How does SQL Injection through SOAP Parameter Tampering attack work? | Attack Analysis | Technical analysis of SQL Injection through SOAP Parameter Tampering (CAPEC-110): An attacker modifies the parameters of the SOAP message that is sent from the service consumer to the service provider to initiate a SQL injection attack. On the service provider side, the SOAP message is parsed and parameters are not pro... | web_security | en | advanced | capec | kwcyber_000041 |
What is JSON Hijacking (aka JavaScript Hijacking) (CAPEC-111) attack pattern? | CAPEC | JSON Hijacking (aka JavaScript Hijacking) (CAPEC-111): An attacker targets a system that uses JavaScript Object Notation (JSON) as a transport mechanism between the client and the server (common in Web 2.0 systems using AJAX) to steal possibly confidential information transmitted from the server back to the client insi... | web_security | en | intermediate | capec | kwcyber_000042 |
ู
ุง ูู ูู
ุท ุงููุฌูู
JSON Hijacking (aka JavaScript Hijacking) (CAPEC-111)ุ | CAPEC | ูู
ุท ุงููุฌูู
JSON Hijacking (aka JavaScript Hijacking) (CAPEC-111): An attacker targets a system that uses JavaScript Object Notation (JSON) as a transport mechanism between the client and the server (common in Web 2.0 systems using AJAX) to steal possibly confidential information transmitted from the server back to the ... | web_security | ar | intermediate | capec | kwcyber_000043 |
How does JSON Hijacking (aka JavaScript Hijacking) attack work? | Attack Analysis | Technical analysis of JSON Hijacking (aka JavaScript Hijacking) (CAPEC-111): An attacker targets a system that uses JavaScript Object Notation (JSON) as a transport mechanism between the client and the server (common in Web 2.0 systems using AJAX) to steal possibly confidential information transmitted from the server b... | web_security | en | advanced | capec | kwcyber_000044 |
What is Brute Force (CAPEC-112) attack pattern? | CAPEC | Brute Force (CAPEC-112): In this attack, some asset (information, functionality, identity, etc.) is protected by a finite secret value. The attacker attempts to gain access to this asset by using trial-and-error to exhaustively explore all the possible secret values in the hope of finding the secret (or a value that is... | web_security | en | intermediate | capec | kwcyber_000045 |
ู
ุง ูู ูู
ุท ุงููุฌูู
Brute Force (CAPEC-112)ุ | CAPEC | ูู
ุท ุงููุฌูู
Brute Force (CAPEC-112): In this attack, some asset (information, functionality, identity, etc.) is protected by a finite secret value. The attacker attempts to gain access to this asset by using trial-and-error to exhaustively explore all the possible secret values in the hope of finding the secret (or a va... | web_security | ar | intermediate | capec | kwcyber_000046 |
How does Brute Force attack work? | Attack Analysis | Technical analysis of Brute Force (CAPEC-112): In this attack, some asset (information, functionality, identity, etc.) is protected by a finite secret value. The attacker attempts to gain access to this asset by using trial-and-error to exhaustively explore all the possible secret values in the hope of finding the secr... | web_security | en | advanced | capec | kwcyber_000047 |
What is Interface Manipulation (CAPEC-113) attack pattern? | CAPEC | Interface Manipulation (CAPEC-113): An adversary manipulates the use or processing of an interface (e.g. Application Programming Interface (API) or System-on-Chip (SoC)) resulting in an adverse impact upon the security of the system implementing the interface. This can allow the adversary to bypass access control and/o... | web_security | en | intermediate | capec | kwcyber_000048 |
ู
ุง ูู ูู
ุท ุงููุฌูู
Interface Manipulation (CAPEC-113)ุ | CAPEC | ูู
ุท ุงููุฌูู
Interface Manipulation (CAPEC-113): An adversary manipulates the use or processing of an interface (e.g. Application Programming Interface (API) or System-on-Chip (SoC)) resulting in an adverse impact upon the security of the system implementing the interface. This can allow the adversary to bypass access co... | web_security | ar | intermediate | capec | kwcyber_000049 |
How does Interface Manipulation attack work? | Attack Analysis | Technical analysis of Interface Manipulation (CAPEC-113): An adversary manipulates the use or processing of an interface (e.g. Application Programming Interface (API) or System-on-Chip (SoC)) resulting in an adverse impact upon the security of the system implementing the interface. This can allow the adversary to bypas... | web_security | en | advanced | capec | kwcyber_000050 |
What is Authentication Abuse (CAPEC-114) attack pattern? | CAPEC | Authentication Abuse (CAPEC-114): An attacker obtains unauthorized access to an application, service or device either through knowledge of the inherent weaknesses of an authentication mechanism, or by exploiting a flaw in the authentication scheme's implementation. In such an attack an authentication mechanism is funct... | web_security | en | intermediate | capec | kwcyber_000051 |
ู
ุง ูู ูู
ุท ุงููุฌูู
Authentication Abuse (CAPEC-114)ุ | CAPEC | ูู
ุท ุงููุฌูู
Authentication Abuse (CAPEC-114): An attacker obtains unauthorized access to an application, service or device either through knowledge of the inherent weaknesses of an authentication mechanism, or by exploiting a flaw in the authentication scheme's implementation. In such an attack an authentication mechani... | web_security | ar | intermediate | capec | kwcyber_000052 |
How does Authentication Abuse attack work? | Attack Analysis | Technical analysis of Authentication Abuse (CAPEC-114): An attacker obtains unauthorized access to an application, service or device either through knowledge of the inherent weaknesses of an authentication mechanism, or by exploiting a flaw in the authentication scheme's implementation. In such an attack an authenticat... | web_security | en | advanced | capec | kwcyber_000053 |
What is Authentication Bypass (CAPEC-115) attack pattern? | CAPEC | Authentication Bypass (CAPEC-115): An attacker gains access to application, service, or device with the privileges of an authorized or privileged user by evading or circumventing an authentication mechanism. The attacker is therefore able to access protected data without authentication ever having taken place. | web_security | en | intermediate | capec | kwcyber_000054 |
ู
ุง ูู ูู
ุท ุงููุฌูู
Authentication Bypass (CAPEC-115)ุ | CAPEC | ูู
ุท ุงููุฌูู
Authentication Bypass (CAPEC-115): An attacker gains access to application, service, or device with the privileges of an authorized or privileged user by evading or circumventing an authentication mechanism. The attacker is therefore able to access protected data without authentication ever having taken plac... | web_security | ar | intermediate | capec | kwcyber_000055 |
How does Authentication Bypass attack work? | Attack Analysis | Technical analysis of Authentication Bypass (CAPEC-115): An attacker gains access to application, service, or device with the privileges of an authorized or privileged user by evading or circumventing an authentication mechanism. The attacker is therefore able to access protected data without authentication ever having... | web_security | en | advanced | capec | kwcyber_000056 |
What is Excavation (CAPEC-116) attack pattern? | CAPEC | Excavation (CAPEC-116): An adversary actively probes the target in a manner that is designed to solicit information that could be leveraged for malicious purposes. | web_security | en | intermediate | capec | kwcyber_000057 |
ู
ุง ูู ูู
ุท ุงููุฌูู
Excavation (CAPEC-116)ุ | CAPEC | ูู
ุท ุงููุฌูู
Excavation (CAPEC-116): An adversary actively probes the target in a manner that is designed to solicit information that could be leveraged for malicious purposes. | web_security | ar | intermediate | capec | kwcyber_000058 |
How does Excavation attack work? | Attack Analysis | Technical analysis of Excavation (CAPEC-116): An adversary actively probes the target in a manner that is designed to solicit information that could be leveraged for malicious purposes. | web_security | en | advanced | capec | kwcyber_000059 |
What is Interception (CAPEC-117) attack pattern? | CAPEC | Interception (CAPEC-117): An adversary monitors data streams to or from the target for information gathering purposes. This attack may be undertaken to solely gather sensitive information or to support a further attack against the target. This attack pattern can involve sniffing network traffic as well as other types o... | web_security | en | intermediate | capec | kwcyber_000060 |
ู
ุง ูู ูู
ุท ุงููุฌูู
Interception (CAPEC-117)ุ | CAPEC | ูู
ุท ุงููุฌูู
Interception (CAPEC-117): An adversary monitors data streams to or from the target for information gathering purposes. This attack may be undertaken to solely gather sensitive information or to support a further attack against the target. This attack pattern can involve sniffing network traffic as well as ot... | web_security | ar | intermediate | capec | kwcyber_000061 |
How does Interception attack work? | Attack Analysis | Technical analysis of Interception (CAPEC-117): An adversary monitors data streams to or from the target for information gathering purposes. This attack may be undertaken to solely gather sensitive information or to support a further attack against the target. This attack pattern can involve sniffing network traffic as... | web_security | en | advanced | capec | kwcyber_000062 |
What is Choosing Message Identifier (CAPEC-12) attack pattern? | CAPEC | Choosing Message Identifier (CAPEC-12): This pattern of attack is defined by the selection of messages distributed via multicast or public information channels that are intended for another client by determining the parameter value assigned to that client. This attack allows the adversary to gain access to potentially ... | web_security | en | intermediate | capec | kwcyber_000063 |
ู
ุง ูู ูู
ุท ุงููุฌูู
Choosing Message Identifier (CAPEC-12)ุ | CAPEC | ูู
ุท ุงููุฌูู
Choosing Message Identifier (CAPEC-12): This pattern of attack is defined by the selection of messages distributed via multicast or public information channels that are intended for another client by determining the parameter value assigned to that client. This attack allows the adversary to gain access to p... | web_security | ar | intermediate | capec | kwcyber_000064 |
How does Choosing Message Identifier attack work? | Attack Analysis | Technical analysis of Choosing Message Identifier (CAPEC-12): This pattern of attack is defined by the selection of messages distributed via multicast or public information channels that are intended for another client by determining the parameter value assigned to that client. This attack allows the adversary to gain ... | web_security | en | advanced | capec | kwcyber_000065 |
What is Double Encoding (CAPEC-120) attack pattern? | CAPEC | Double Encoding (CAPEC-120): The adversary utilizes a repeating of the encoding process for a set of characters (that is, character encoding a character encoding of a character) to obfuscate the payload of a particular request. This may allow the adversary to bypass filters that attempt to detect illegal characters or ... | web_security | en | intermediate | capec | kwcyber_000066 |
ู
ุง ูู ูู
ุท ุงููุฌูู
Double Encoding (CAPEC-120)ุ | CAPEC | ูู
ุท ุงููุฌูู
Double Encoding (CAPEC-120): The adversary utilizes a repeating of the encoding process for a set of characters (that is, character encoding a character encoding of a character) to obfuscate the payload of a particular request. This may allow the adversary to bypass filters that attempt to detect illegal cha... | web_security | ar | intermediate | capec | kwcyber_000067 |
How does Double Encoding attack work? | Attack Analysis | Technical analysis of Double Encoding (CAPEC-120): The adversary utilizes a repeating of the encoding process for a set of characters (that is, character encoding a character encoding of a character) to obfuscate the payload of a particular request. This may allow the adversary to bypass filters that attempt to detect ... | web_security | en | advanced | capec | kwcyber_000068 |
What is Exploit Non-Production Interfaces (CAPEC-121) attack pattern? | CAPEC | Exploit Non-Production Interfaces (CAPEC-121): <xhtml:p>An adversary exploits a sample, demonstration, test, or debug interface that is unintentionally enabled on a production system, with the goal of gleaning information or leveraging functionality that would otherwise be unavailable.</xhtml:p> | web_security | en | intermediate | capec | kwcyber_000069 |
ู
ุง ูู ูู
ุท ุงููุฌูู
Exploit Non-Production Interfaces (CAPEC-121)ุ | CAPEC | ูู
ุท ุงููุฌูู
Exploit Non-Production Interfaces (CAPEC-121): <xhtml:p>An adversary exploits a sample, demonstration, test, or debug interface that is unintentionally enabled on a production system, with the goal of gleaning information or leveraging functionality that would otherwise be unavailable.</xhtml:p> | web_security | ar | intermediate | capec | kwcyber_000070 |
How does Exploit Non-Production Interfaces attack work? | Attack Analysis | Technical analysis of Exploit Non-Production Interfaces (CAPEC-121): <xhtml:p>An adversary exploits a sample, demonstration, test, or debug interface that is unintentionally enabled on a production system, with the goal of gleaning information or leveraging functionality that would otherwise be unavailable.</xhtml:p> | web_security | en | advanced | capec | kwcyber_000071 |
What is Privilege Abuse (CAPEC-122) attack pattern? | CAPEC | Privilege Abuse (CAPEC-122): An adversary is able to exploit features of the target that should be reserved for privileged users or administrators but are exposed to use by lower or non-privileged accounts. Access to sensitive information and functionality must be controlled to ensure that only authorized users are abl... | web_security | en | intermediate | capec | kwcyber_000072 |
ู
ุง ูู ูู
ุท ุงููุฌูู
Privilege Abuse (CAPEC-122)ุ | CAPEC | ูู
ุท ุงููุฌูู
Privilege Abuse (CAPEC-122): An adversary is able to exploit features of the target that should be reserved for privileged users or administrators but are exposed to use by lower or non-privileged accounts. Access to sensitive information and functionality must be controlled to ensure that only authorized us... | web_security | ar | intermediate | capec | kwcyber_000073 |
How does Privilege Abuse attack work? | Attack Analysis | Technical analysis of Privilege Abuse (CAPEC-122): An adversary is able to exploit features of the target that should be reserved for privileged users or administrators but are exposed to use by lower or non-privileged accounts. Access to sensitive information and functionality must be controlled to ensure that only au... | web_security | en | advanced | capec | kwcyber_000074 |
What is Buffer Manipulation (CAPEC-123) attack pattern? | CAPEC | Buffer Manipulation (CAPEC-123): An adversary manipulates an application's interaction with a buffer in an attempt to read or modify data they shouldn't have access to. Buffer attacks are distinguished in that it is the buffer space itself that is the target of the attack rather than any code responsible for interpreti... | web_security | en | intermediate | capec | kwcyber_000075 |
ู
ุง ูู ูู
ุท ุงููุฌูู
Buffer Manipulation (CAPEC-123)ุ | CAPEC | ูู
ุท ุงููุฌูู
Buffer Manipulation (CAPEC-123): An adversary manipulates an application's interaction with a buffer in an attempt to read or modify data they shouldn't have access to. Buffer attacks are distinguished in that it is the buffer space itself that is the target of the attack rather than any code responsible for... | web_security | ar | intermediate | capec | kwcyber_000076 |
How does Buffer Manipulation attack work? | Attack Analysis | Technical analysis of Buffer Manipulation (CAPEC-123): An adversary manipulates an application's interaction with a buffer in an attempt to read or modify data they shouldn't have access to. Buffer attacks are distinguished in that it is the buffer space itself that is the target of the attack rather than any code resp... | web_security | en | advanced | capec | kwcyber_000077 |
What is Shared Resource Manipulation (CAPEC-124) attack pattern? | CAPEC | Shared Resource Manipulation (CAPEC-124): An adversary exploits a resource shared between multiple applications, an application pool or hardware pin multiplexing to affect behavior. Resources may be shared between multiple applications or between multiple threads of a single application. Resource sharing is usually acc... | web_security | en | intermediate | capec | kwcyber_000078 |
ู
ุง ูู ูู
ุท ุงููุฌูู
Shared Resource Manipulation (CAPEC-124)ุ | CAPEC | ูู
ุท ุงููุฌูู
Shared Resource Manipulation (CAPEC-124): An adversary exploits a resource shared between multiple applications, an application pool or hardware pin multiplexing to affect behavior. Resources may be shared between multiple applications or between multiple threads of a single application. Resource sharing is ... | web_security | ar | intermediate | capec | kwcyber_000079 |
How does Shared Resource Manipulation attack work? | Attack Analysis | Technical analysis of Shared Resource Manipulation (CAPEC-124): An adversary exploits a resource shared between multiple applications, an application pool or hardware pin multiplexing to affect behavior. Resources may be shared between multiple applications or between multiple threads of a single application. Resource ... | web_security | en | advanced | capec | kwcyber_000080 |
What is Flooding (CAPEC-125) attack pattern? | CAPEC | Flooding (CAPEC-125): An adversary consumes the resources of a target by rapidly engaging in a large number of interactions with the target. This type of attack generally exposes a weakness in rate limiting or flow. When successful this attack prevents legitimate users from accessing the service and can cause the targe... | web_security | en | intermediate | capec | kwcyber_000081 |
ู
ุง ูู ูู
ุท ุงููุฌูู
Flooding (CAPEC-125)ุ | CAPEC | ูู
ุท ุงููุฌูู
Flooding (CAPEC-125): An adversary consumes the resources of a target by rapidly engaging in a large number of interactions with the target. This type of attack generally exposes a weakness in rate limiting or flow. When successful this attack prevents legitimate users from accessing the service and can caus... | web_security | ar | intermediate | capec | kwcyber_000082 |
How does Flooding attack work? | Attack Analysis | Technical analysis of Flooding (CAPEC-125): An adversary consumes the resources of a target by rapidly engaging in a large number of interactions with the target. This type of attack generally exposes a weakness in rate limiting or flow. When successful this attack prevents legitimate users from accessing the service a... | web_security | en | advanced | capec | kwcyber_000083 |
What is Path Traversal (CAPEC-126) attack pattern? | CAPEC | Path Traversal (CAPEC-126): An adversary uses path manipulation methods to exploit insufficient input validation of a target to obtain access to data that should be not be retrievable by ordinary well-formed requests. A typical variety of this attack involves specifying a path to a desired file together with dot-dot-sl... | web_security | en | intermediate | capec | kwcyber_000084 |
ู
ุง ูู ูู
ุท ุงููุฌูู
Path Traversal (CAPEC-126)ุ | CAPEC | ูู
ุท ุงููุฌูู
Path Traversal (CAPEC-126): An adversary uses path manipulation methods to exploit insufficient input validation of a target to obtain access to data that should be not be retrievable by ordinary well-formed requests. A typical variety of this attack involves specifying a path to a desired file together with... | web_security | ar | intermediate | capec | kwcyber_000085 |
How does Path Traversal attack work? | Attack Analysis | Technical analysis of Path Traversal (CAPEC-126): An adversary uses path manipulation methods to exploit insufficient input validation of a target to obtain access to data that should be not be retrievable by ordinary well-formed requests. A typical variety of this attack involves specifying a path to a desired file to... | web_security | en | advanced | capec | kwcyber_000086 |
What is Directory Indexing (CAPEC-127) attack pattern? | CAPEC | Directory Indexing (CAPEC-127): An adversary crafts a request to a target that results in the target listing/indexing the content of a directory as output. One common method of triggering directory contents as output is to construct a request containing a path that terminates in a directory name rather than a file name... | web_security | en | intermediate | capec | kwcyber_000087 |
ู
ุง ูู ูู
ุท ุงููุฌูู
Directory Indexing (CAPEC-127)ุ | CAPEC | ูู
ุท ุงููุฌูู
Directory Indexing (CAPEC-127): An adversary crafts a request to a target that results in the target listing/indexing the content of a directory as output. One common method of triggering directory contents as output is to construct a request containing a path that terminates in a directory name rather than ... | web_security | ar | intermediate | capec | kwcyber_000088 |
How does Directory Indexing attack work? | Attack Analysis | Technical analysis of Directory Indexing (CAPEC-127): An adversary crafts a request to a target that results in the target listing/indexing the content of a directory as output. One common method of triggering directory contents as output is to construct a request containing a path that terminates in a directory name r... | web_security | en | advanced | capec | kwcyber_000089 |
What is Integer Attacks (CAPEC-128) attack pattern? | CAPEC | Integer Attacks (CAPEC-128): An attacker takes advantage of the structure of integer variables to cause these variables to assume values that are not expected by an application. For example, adding one to the largest positive integer in a signed integer variable results in a negative number. Negative numbers may be ill... | web_security | en | intermediate | capec | kwcyber_000090 |
ู
ุง ูู ูู
ุท ุงููุฌูู
Integer Attacks (CAPEC-128)ุ | CAPEC | ูู
ุท ุงููุฌูู
Integer Attacks (CAPEC-128): An attacker takes advantage of the structure of integer variables to cause these variables to assume values that are not expected by an application. For example, adding one to the largest positive integer in a signed integer variable results in a negative number. Negative numbers... | web_security | ar | intermediate | capec | kwcyber_000091 |
How does Integer Attacks attack work? | Attack Analysis | Technical analysis of Integer Attacks (CAPEC-128): An attacker takes advantage of the structure of integer variables to cause these variables to assume values that are not expected by an application. For example, adding one to the largest positive integer in a signed integer variable results in a negative number. Negat... | web_security | en | advanced | capec | kwcyber_000092 |
What is Pointer Manipulation (CAPEC-129) attack pattern? | CAPEC | Pointer Manipulation (CAPEC-129): This attack pattern involves an adversary manipulating a pointer within a target application resulting in the application accessing an unintended memory location. This can result in the crashing of the application or, for certain pointer values, access to data that would not normally b... | web_security | en | intermediate | capec | kwcyber_000093 |
ู
ุง ูู ูู
ุท ุงููุฌูู
Pointer Manipulation (CAPEC-129)ุ | CAPEC | ูู
ุท ุงููุฌูู
Pointer Manipulation (CAPEC-129): This attack pattern involves an adversary manipulating a pointer within a target application resulting in the application accessing an unintended memory location. This can result in the crashing of the application or, for certain pointer values, access to data that would not... | web_security | ar | intermediate | capec | kwcyber_000094 |
How does Pointer Manipulation attack work? | Attack Analysis | Technical analysis of Pointer Manipulation (CAPEC-129): This attack pattern involves an adversary manipulating a pointer within a target application resulting in the application accessing an unintended memory location. This can result in the crashing of the application or, for certain pointer values, access to data tha... | web_security | en | advanced | capec | kwcyber_000095 |
What is Subverting Environment Variable Values (CAPEC-13) attack pattern? | CAPEC | Subverting Environment Variable Values (CAPEC-13): The adversary directly or indirectly modifies environment variables used by or controlling the target software. The adversary's goal is to cause the target software to deviate from its expected operation in a manner that benefits the adversary. | web_security | en | intermediate | capec | kwcyber_000096 |
ู
ุง ูู ูู
ุท ุงููุฌูู
Subverting Environment Variable Values (CAPEC-13)ุ | CAPEC | ูู
ุท ุงููุฌูู
Subverting Environment Variable Values (CAPEC-13): The adversary directly or indirectly modifies environment variables used by or controlling the target software. The adversary's goal is to cause the target software to deviate from its expected operation in a manner that benefits the adversary. | web_security | ar | intermediate | capec | kwcyber_000097 |
How does Subverting Environment Variable Values attack work? | Attack Analysis | Technical analysis of Subverting Environment Variable Values (CAPEC-13): The adversary directly or indirectly modifies environment variables used by or controlling the target software. The adversary's goal is to cause the target software to deviate from its expected operation in a manner that benefits the adversary. | web_security | en | advanced | capec | kwcyber_000098 |
What is Excessive Allocation (CAPEC-130) attack pattern? | CAPEC | Excessive Allocation (CAPEC-130): An adversary causes the target to allocate excessive resources to servicing the attackers' request, thereby reducing the resources available for legitimate services and degrading or denying services. Usually, this attack focuses on memory allocation, but any finite resource on the targ... | web_security | en | intermediate | capec | kwcyber_000099 |
No dataset card yet