CAPEC Threat Library (meta-attack patterns) ()
CAPEC Threat Library (meta-attack patterns)
CAPEC-94: Adversary in the Middle (AiTM) (Threat Event)
CAPEC-115: Authentication Bypass (Threat Event)
CAPEC-112: Brute Force (Threat Event)
CAPEC-242: Code Injection (Threat Event)
CAPEC-248: Command Injection (Threat Event)
CAPEC-176: Configuration/Environment Manipulation (Threat Event)
CAPEC-148: Content Spoofing (Threat Event)
CAPEC-130: Excessive Allocation (Threat Event)
CAPEC-21: Exploitation of Trusted Identifiers (Threat Event)
CAPEC-125: Flooding (Threat Event)
CAPEC-28: Fuzzing (Threat Event)
CAPEC-151: Identity Spoofing (Threat Event)
CAPEC-153: Input Data Manipulation (Threat Event)
CAPEC-117: Interception (Threat Event)
CAPEC-26: Leveraging Race Conditions (Threat Event)
CAPEC-441: Malicious Logic Insertion (Threat Event)
CAPEC-74: Manipulating State (Threat Event)
CAPEC-137: Parameter Injection (Threat Event)
CAPEC-122: Privilege Abuse (Threat Event)
CAPEC-233: Privilege Escalation (Threat Event)
CAPEC-192: Protocol Analysis (Threat Event)
CAPEC-184: Software Integrity Attack (Threat Event)
CAPEC-560: Use of Known Domain Credentials (Threat Event)
CAPEC-113: Interface Manipulation
CAPEC-114: Authentication Abuse
CAPEC-116: Excavation
CAPEC-123: Buffer Manipulation
CAPEC-124: Shared Resource Manipulation
CAPEC-129: Pointer Manipulation
CAPEC-131: Resource Leak Exposure
CAPEC-154: Resource Location Spoofing
CAPEC-161: Infrastructure Manipulation
CAPEC-165: File Manipulation
CAPEC-169: Footprinting
CAPEC-173: Action Spoofing
CAPEC-175: Code Inclusion
CAPEC-188: Reverse Engineering
CAPEC-212: Functionality Misuse
CAPEC-216: Communication Channel Manipulation
CAPEC-22: Exploiting Trust in Client
CAPEC-224: Fingerprinting
CAPEC-227: Sustained Client Engagement
CAPEC-240: Resource Injection
CAPEC-25: Forced Deadlock
CAPEC-272: Protocol Manipulation
CAPEC-390: Bypassing Physical Security
CAPEC-410: Information Elicitation
CAPEC-416: Manipulate Human Behavior
CAPEC-438: Modification During Manufacture
CAPEC-439: Manipulation During Distribution
CAPEC-440: Hardware Integrity Attack
CAPEC-507: Physical Theft
CAPEC-548: Contaminate Resource
CAPEC-549: Local Execution of Code
CAPEC-554: Functionality Bypass
CAPEC-586: Object Injection
CAPEC-594: Traffic Injection
CAPEC-607: Obstruction
CAPEC-624: Hardware Fault Injection
CAPEC-690: Metadata Spoofing
CAPEC-699: Eavesdropping on a Monitor