An adversary attacks a system by bypassing some or all functionality intended to protect it. Often, a system user will think that protection is in place, but the functionality behind those protections has been disabled by the adversary.
|
|
| ID | CAPEC-554 |
| Latest Sync Date | 11/05/25 15:15:38 |
| Original ID | 554 |
| Abstraction | Meta |
| Status | Draft |
| Alternate Terms | |
| Likelihood Of Attack | Medium |
| Typical Severity | High |
| Related Attack Patterns | |
| Execution Flow | |
| Prerequisites | |
| Skills Required | |
| Resources Required | |
| Indicators | |
| Consequences | |
| Mitigations | |
| Example Instances | |
| Related Weaknesses | ::424::1299:: |
| Taxonomy Mappings | |
| Notes | |