Capec的新手?Start Here
>CAPEC List> CAPEC-646: Peripheral Footprinting (Version 3.9)

CAPEC-646: Peripheral Footprinting

Attack Pattern ID: 646
抽象:Standard
View customized information:
+Description
Adversaries may attempt to obtain information about attached peripheral devices and components connected to a computer system. Examples may include discovering the presence of iOS devices by searching for backups, analyzing the Windows registry to determine what USB devices have been connected, or infecting a victim system with malware to report when a USB device has been connected. This may allow the adversary to gain additional insight about the system or network environment, which may be useful in constructing further attacks.
+Likelihood Of Attack

Low

+Typical Severity

Medium

+Relationships
部分帮助该表显示了与此攻击模式相关的其他攻击模式和高级类别。这些关系定义为childof和parentof,并深入了解可能存在于较高和较低抽象水平的类似项目。此外,定义了诸如Canfollow,Peerof和Canalsobe之类的关系,以显示用户可能想要探索的类似攻击模式。
Nature Type ID Name
ChildOf Meta Attack PatternMeta Attack Pattern - A meta level attack pattern in CAPEC is a decidedly abstract characterization of a specific methodology or technique used in an attack. A meta attack pattern is often void of a specific technology or implementation and is meant to provide an understanding of a high level approach. A meta level attack pattern is a generalization of related group of standard level attack patterns. Meta level attack patterns are particularly useful for architecture and design level threat modeling exercises. 169 Footprinting
CanFollow Detailed Attack PatternDetailed Attack Pattern - A detailed level attack pattern in CAPEC provides a low level of detail, typically leveraging a specific technique and targeting a specific technology, and expresses a complete execution flow. Detailed attack patterns are more specific than meta attack patterns and standard attack patterns and often require a specific protection mechanism to mitigate actual attacks. A detailed level attack pattern often will leverage a number of different standard level attack patterns chained together to accomplish a goal. 270 Modification of Registry Run Keys
部分帮助This table shows the views that this attack pattern belongs to and top level categories within that view.
+Prerequisites
The adversary needs either physical or remote access to the victim system.
+Skills Required
[Level: Medium]
The adversary needs to be able to infect the victim system in a manner that gives them remote access.
[Level: Medium]
如果分析Windows注册表,对手必须了解注册表结构,以了解在哪里寻找设备。
+缓解
Identify programs that may be used to acquire peripheral information and block them by using a software restriction policy or tools that restrict program execution by using a process allowlist.
+Taxonomy Mappings
部分帮助CAPEC mappings to ATT&CK techniques leverage an inheritance model to streamline and minimize direct CAPEC/ATT&CK mappings. Inheritance of a mapping is indicated by text stating that the parent CAPEC has relevant ATT&CK mappings. Note that the ATT&CK Enterprise Framework does not use an inheritance model as part of the mapping to CAPEC.
Relevant to the ATT&CK taxonomy mapping (also seeparent)
Entry ID Entry Name
1120 外围设备发现
+Content History
Submissions
Submission Date Submitter Organization
2018-07-31
(Version 2.12)
CAPEC Content Team
Modifications
Modification Date 修饰符 Organization
2019-04-04
(Version 3.1)
CAPEC Content Team manbetx客户端首页
Updated Related_Attack_Patterns
2019-09-30
(版本3.2)
CAPEC Content Team manbetx客户端首页
Updated @Abstraction
2020-07-30
(Version 3.3)
CAPEC Content Team manbetx客户端首页
Updated Mitigations, Skills_Required
More information is available — Please select a different filter.
页面最后更新或审查:October 21, 2021