CAPEC Threat Library (meta-attack patterns)
(
)
You can generate this view by deleting all contents and selecting/dragging all motivation elements in the "CAPEC Architectural Attack Patterns" folder on the canvas.
CAPEC-94: Adversary in the Middle (AiTM)
(Threat Event)
CAPEC-115: Authentication Bypass
(Threat Event)
CAPEC-112: Brute Force
(Threat Event)
CAPEC-242: Code Injection
(Threat Event)
CAPEC-248: Command Injection
(Threat Event)
CAPEC-176: Configuration/Environment Manipulation
(Threat Event)
CAPEC-148: Content Spoofing
(Threat Event)
CAPEC-130: Excessive Allocation
(Threat Event)
CAPEC-21: Exploitation of Trusted Identifiers
(Threat Event)
CAPEC-125: Flooding
(Threat Event)
CAPEC-28: Fuzzing
(Threat Event)
CAPEC-151: Identity Spoofing
(Threat Event)
CAPEC-153: Input Data Manipulation
(Threat Event)
CAPEC-117: Interception
(Threat Event)
CAPEC-26: Leveraging Race Conditions
(Threat Event)
CAPEC-441: Malicious Logic Insertion
(Threat Event)
CAPEC-74: Manipulating State
(Threat Event)
CAPEC-137: Parameter Injection
(Threat Event)
CAPEC-122: Privilege Abuse
(Threat Event)
CAPEC-233: Privilege Escalation
(Threat Event)
CAPEC-192: Protocol Analysis
(Threat Event)
CAPEC-184: Software Integrity Attack
(Threat Event)
CAPEC-560: Use of Known Domain Credentials
(Threat Event)
CAPEC-113: Interface Manipulation
CAPEC-114: Authentication Abuse
CAPEC-116: Excavation
CAPEC-123: Buffer Manipulation
CAPEC-124: Shared Resource Manipulation
CAPEC-129: Pointer Manipulation
CAPEC-131: Resource Leak Exposure
CAPEC-154: Resource Location Spoofing
CAPEC-161: Infrastructure Manipulation
CAPEC-165: File Manipulation
CAPEC-169: Footprinting
CAPEC-173: Action Spoofing
CAPEC-175: Code Inclusion
CAPEC-188: Reverse Engineering
CAPEC-212: Functionality Misuse
CAPEC-216: Communication Channel Manipulation
CAPEC-22: Exploiting Trust in Client
CAPEC-224: Fingerprinting
CAPEC-227: Sustained Client Engagement
CAPEC-240: Resource Injection
CAPEC-25: Forced Deadlock
CAPEC-272: Protocol Manipulation
CAPEC-390: Bypassing Physical Security
CAPEC-410: Information Elicitation
CAPEC-416: Manipulate Human Behavior
CAPEC-438: Modification During Manufacture
CAPEC-439: Manipulation During Distribution
CAPEC-440: Hardware Integrity Attack
CAPEC-507: Physical Theft
CAPEC-548: Contaminate Resource
CAPEC-549: Local Execution of Code
CAPEC-554: Functionality Bypass
CAPEC-586: Object Injection
CAPEC-594: Traffic Injection
CAPEC-607: Obstruction
CAPEC-624: Hardware Fault Injection
CAPEC-690: Metadata Spoofing
CAPEC-699: Eavesdropping on a Monitor