txt2stix 0.0.4__py3-none-any.whl
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- txt2stix/__init__.py +33 -0
- txt2stix/ai_extractor/__init__.py +15 -0
- txt2stix/ai_extractor/anthropic.py +12 -0
- txt2stix/ai_extractor/base.py +87 -0
- txt2stix/ai_extractor/deepseek.py +19 -0
- txt2stix/ai_extractor/gemini.py +18 -0
- txt2stix/ai_extractor/openai.py +15 -0
- txt2stix/ai_extractor/openrouter.py +20 -0
- txt2stix/ai_extractor/prompts.py +164 -0
- txt2stix/ai_extractor/utils.py +85 -0
- txt2stix/attack_flow.py +101 -0
- txt2stix/bundler.py +428 -0
- txt2stix/common.py +23 -0
- txt2stix/extractions.py +59 -0
- txt2stix/includes/__init__.py +0 -0
- txt2stix/includes/extractions/ai/config.yaml +1023 -0
- txt2stix/includes/extractions/lookup/config.yaml +393 -0
- txt2stix/includes/extractions/pattern/config.yaml +609 -0
- txt2stix/includes/helpers/mimetype_filename_extension_list.csv +936 -0
- txt2stix/includes/helpers/stix_relationship_types.txt +41 -0
- txt2stix/includes/helpers/tlds.txt +1446 -0
- txt2stix/includes/helpers/windows_registry_key_prefix.txt +12 -0
- txt2stix/includes/lookups/_README.md +11 -0
- txt2stix/includes/lookups/_generate_lookups.py +247 -0
- txt2stix/includes/lookups/attack_pattern.txt +1 -0
- txt2stix/includes/lookups/campaign.txt +1 -0
- txt2stix/includes/lookups/country_iso3166_alpha2.txt +249 -0
- txt2stix/includes/lookups/course_of_action.txt +1 -0
- txt2stix/includes/lookups/disarm_id_v1_5.txt +345 -0
- txt2stix/includes/lookups/disarm_name_v1_5.txt +347 -0
- txt2stix/includes/lookups/extensions.txt +78 -0
- txt2stix/includes/lookups/identity.txt +1 -0
- txt2stix/includes/lookups/infrastructure.txt +1 -0
- txt2stix/includes/lookups/intrusion_set.txt +1 -0
- txt2stix/includes/lookups/malware.txt +2 -0
- txt2stix/includes/lookups/mitre_atlas_id_v4_5_2.txt +116 -0
- txt2stix/includes/lookups/mitre_atlas_name_v4_5_2.txt +117 -0
- txt2stix/includes/lookups/mitre_attack_enterprise_aliases_v16_0.txt +1502 -0
- txt2stix/includes/lookups/mitre_attack_enterprise_id_v16_0.txt +1656 -0
- txt2stix/includes/lookups/mitre_attack_enterprise_name_v16_0.txt +1765 -0
- txt2stix/includes/lookups/mitre_attack_ics_aliases_v16_0.txt +141 -0
- txt2stix/includes/lookups/mitre_attack_ics_id_v16_0.txt +254 -0
- txt2stix/includes/lookups/mitre_attack_ics_name_v16_0.txt +293 -0
- txt2stix/includes/lookups/mitre_attack_mobile_aliases_v16_0.txt +159 -0
- txt2stix/includes/lookups/mitre_attack_mobile_id_v16_0.txt +277 -0
- txt2stix/includes/lookups/mitre_attack_mobile_name_v16_0.txt +296 -0
- txt2stix/includes/lookups/mitre_capec_id_v3_9.txt +559 -0
- txt2stix/includes/lookups/mitre_capec_name_v3_9.txt +560 -0
- txt2stix/includes/lookups/mitre_cwe_id_v4_15.txt +939 -0
- txt2stix/includes/lookups/mitre_cwe_name_v4_15.txt +939 -0
- txt2stix/includes/lookups/threat_actor.txt +1 -0
- txt2stix/includes/lookups/tld.txt +1422 -0
- txt2stix/includes/lookups/tool.txt +1 -0
- txt2stix/includes/tests/test_cases.yaml +695 -0
- txt2stix/indicator.py +860 -0
- txt2stix/lookups.py +68 -0
- txt2stix/pattern/__init__.py +13 -0
- txt2stix/pattern/extractors/__init__.py +0 -0
- txt2stix/pattern/extractors/base_extractor.py +167 -0
- txt2stix/pattern/extractors/card/README.md +34 -0
- txt2stix/pattern/extractors/card/__init__.py +15 -0
- txt2stix/pattern/extractors/card/amex_card_extractor.py +52 -0
- txt2stix/pattern/extractors/card/diners_card_extractor.py +47 -0
- txt2stix/pattern/extractors/card/discover_card_extractor.py +48 -0
- txt2stix/pattern/extractors/card/jcb_card_extractor.py +43 -0
- txt2stix/pattern/extractors/card/master_card_extractor.py +63 -0
- txt2stix/pattern/extractors/card/union_card_extractor.py +38 -0
- txt2stix/pattern/extractors/card/visa_card_extractor.py +46 -0
- txt2stix/pattern/extractors/crypto/__init__.py +3 -0
- txt2stix/pattern/extractors/crypto/btc_extractor.py +38 -0
- txt2stix/pattern/extractors/directory/__init__.py +10 -0
- txt2stix/pattern/extractors/directory/unix_directory_extractor.py +40 -0
- txt2stix/pattern/extractors/directory/unix_file_path_extractor.py +42 -0
- txt2stix/pattern/extractors/directory/windows_directory_path_extractor.py +47 -0
- txt2stix/pattern/extractors/directory/windows_file_path_extractor.py +42 -0
- txt2stix/pattern/extractors/domain/__init__.py +8 -0
- txt2stix/pattern/extractors/domain/domain_extractor.py +39 -0
- txt2stix/pattern/extractors/domain/hostname_extractor.py +36 -0
- txt2stix/pattern/extractors/domain/sub_domain_extractor.py +49 -0
- txt2stix/pattern/extractors/hashes/__init__.py +16 -0
- txt2stix/pattern/extractors/hashes/md5_extractor.py +16 -0
- txt2stix/pattern/extractors/hashes/sha1_extractor.py +14 -0
- txt2stix/pattern/extractors/hashes/sha224_extractor.py +18 -0
- txt2stix/pattern/extractors/hashes/sha2_256_exactor.py +14 -0
- txt2stix/pattern/extractors/hashes/sha2_512_exactor.py +13 -0
- txt2stix/pattern/extractors/hashes/sha3_256_exactor.py +15 -0
- txt2stix/pattern/extractors/hashes/sha3_512_exactor.py +16 -0
- txt2stix/pattern/extractors/helper.py +64 -0
- txt2stix/pattern/extractors/ip/__init__.py +14 -0
- txt2stix/pattern/extractors/ip/ipv4_cidr_extractor.py +49 -0
- txt2stix/pattern/extractors/ip/ipv4_extractor.py +18 -0
- txt2stix/pattern/extractors/ip/ipv4_port_extractor.py +42 -0
- txt2stix/pattern/extractors/ip/ipv6_cidr_extractor.py +18 -0
- txt2stix/pattern/extractors/ip/ipv6_extractor.py +16 -0
- txt2stix/pattern/extractors/ip/ipv6_port_extractor.py +46 -0
- txt2stix/pattern/extractors/others/__init__.py +22 -0
- txt2stix/pattern/extractors/others/asn_extractor.py +14 -0
- txt2stix/pattern/extractors/others/cpe_extractor.py +29 -0
- txt2stix/pattern/extractors/others/cve_extractor.py +14 -0
- txt2stix/pattern/extractors/others/email_extractor.py +21 -0
- txt2stix/pattern/extractors/others/filename_extractor.py +17 -0
- txt2stix/pattern/extractors/others/iban_extractor.py +15 -0
- txt2stix/pattern/extractors/others/mac_address_extractor.py +13 -0
- txt2stix/pattern/extractors/others/phonenumber_extractor.py +41 -0
- txt2stix/pattern/extractors/others/user_agent_extractor.py +20 -0
- txt2stix/pattern/extractors/others/windows_registry_key_extractor.py +18 -0
- txt2stix/pattern/extractors/url/__init__.py +7 -0
- txt2stix/pattern/extractors/url/url_extractor.py +22 -0
- txt2stix/pattern/extractors/url/url_file_extractor.py +21 -0
- txt2stix/pattern/extractors/url/url_path_extractor.py +74 -0
- txt2stix/retriever.py +126 -0
- txt2stix/stix.py +1 -0
- txt2stix/txt2stix.py +336 -0
- txt2stix/utils.py +86 -0
- txt2stix-0.0.4.dist-info/METADATA +190 -0
- txt2stix-0.0.4.dist-info/RECORD +119 -0
- txt2stix-0.0.4.dist-info/WHEEL +4 -0
- txt2stix-0.0.4.dist-info/entry_points.txt +2 -0
- txt2stix-0.0.4.dist-info/licenses/LICENSE +202 -0
@@ -0,0 +1,560 @@
|
|
1
|
+
The MITRE Corporation
|
2
|
+
Accessing Functionality Not Properly Constrained by ACLs
|
3
|
+
Buffer Overflow via Environment Variables
|
4
|
+
Overflow Buffers
|
5
|
+
Server Side Include (SSI) Injection
|
6
|
+
Session Sidejacking
|
7
|
+
Clickjacking
|
8
|
+
Cross Zone Scripting
|
9
|
+
HTTP Request Splitting
|
10
|
+
Cross Site Tracing
|
11
|
+
Command Line Execution through SQL Injection
|
12
|
+
Object Relational Mapping Injection
|
13
|
+
Cause Web Server Misclassification
|
14
|
+
SQL Injection through SOAP Parameter Tampering
|
15
|
+
JSON Hijacking (aka JavaScript Hijacking)
|
16
|
+
Brute Force
|
17
|
+
Interface Manipulation
|
18
|
+
Authentication Abuse
|
19
|
+
Authentication Bypass
|
20
|
+
Excavation
|
21
|
+
Interception
|
22
|
+
Choosing Message Identifier
|
23
|
+
Double Encoding
|
24
|
+
Exploit Non-Production Interfaces
|
25
|
+
Privilege Abuse
|
26
|
+
Buffer Manipulation
|
27
|
+
Shared Resource Manipulation
|
28
|
+
Flooding
|
29
|
+
Path Traversal
|
30
|
+
Directory Indexing
|
31
|
+
Integer Attacks
|
32
|
+
Pointer Manipulation
|
33
|
+
Subverting Environment Variable Values
|
34
|
+
Excessive Allocation
|
35
|
+
Resource Leak Exposure
|
36
|
+
Symlink Attack
|
37
|
+
Try All Common Switches
|
38
|
+
Email Injection
|
39
|
+
Format String Injection
|
40
|
+
LDAP Injection
|
41
|
+
Parameter Injection
|
42
|
+
Reflection Injection
|
43
|
+
Relative Path Traversal
|
44
|
+
Client-side Injection-induced Buffer Overflow
|
45
|
+
Bypassing of Intermediate Forms in Multiple-Form Sets
|
46
|
+
Cache Poisoning
|
47
|
+
DNS Cache Poisoning
|
48
|
+
Detect Unpublicized Web Pages
|
49
|
+
Detect Unpublicized Web Services
|
50
|
+
Checksum Spoofing
|
51
|
+
XML Schema Poisoning
|
52
|
+
XML Ping of the Death
|
53
|
+
Content Spoofing
|
54
|
+
Explore for Predictable Temporary File Names
|
55
|
+
Command Delimiters
|
56
|
+
Collect Data from Common Resource Locations
|
57
|
+
Identity Spoofing
|
58
|
+
Input Data Manipulation
|
59
|
+
Resource Location Spoofing
|
60
|
+
Screen Temporary Files for Sensitive Information
|
61
|
+
Sniffing Attacks
|
62
|
+
Sniffing Network Traffic
|
63
|
+
Redirect Access to Libraries
|
64
|
+
Dictionary-based Password Attack
|
65
|
+
Exploit Script-Based APIs
|
66
|
+
Infrastructure Manipulation
|
67
|
+
Manipulating Hidden Fields
|
68
|
+
Spear Phishing
|
69
|
+
Mobile Phishing
|
70
|
+
File Manipulation
|
71
|
+
Force the System to Reset Values
|
72
|
+
White Box Reverse Engineering
|
73
|
+
Windows ::DATA Alternate Data Stream
|
74
|
+
Footprinting
|
75
|
+
Using Malicious Files
|
76
|
+
Web Application Fingerprinting
|
77
|
+
Action Spoofing
|
78
|
+
Flash Parameter Injection
|
79
|
+
Code Inclusion
|
80
|
+
Configuration/Environment Manipulation
|
81
|
+
Create files with the same name as files protected with a higher classification
|
82
|
+
Cross-Site Flashing
|
83
|
+
Calling Micro-Services Directly
|
84
|
+
XSS Targeting Non-Script Elements
|
85
|
+
Exploiting Incorrectly Configured Access Control Security Levels
|
86
|
+
Flash File Overlay
|
87
|
+
Flash Injection
|
88
|
+
IMAP/SMTP Command Injection
|
89
|
+
Software Integrity Attack
|
90
|
+
Malicious Software Download
|
91
|
+
Malicious Software Update
|
92
|
+
Malicious Automated Software Update via Redirection
|
93
|
+
Reverse Engineering
|
94
|
+
Black Box Reverse Engineering
|
95
|
+
Embedding Scripts within Scripts
|
96
|
+
Reverse Engineer an Executable to Expose Assumed Hidden Functionality
|
97
|
+
Read Sensitive Constants Within an Executable
|
98
|
+
Protocol Analysis
|
99
|
+
PHP Remote File Inclusion
|
100
|
+
Fake the Source of Data
|
101
|
+
Principal Spoof
|
102
|
+
Session Credential Falsification through Forging
|
103
|
+
Exponential Data Expansion
|
104
|
+
XSS Targeting Error Pages
|
105
|
+
XSS Using Alternate Syntax
|
106
|
+
Inducing Account Lockout
|
107
|
+
Encryption Brute Forcing
|
108
|
+
Removal of filters: Input filters, output filters, data masking
|
109
|
+
Serialized Data External Linking
|
110
|
+
Create Malicious Client
|
111
|
+
Manipulate Registry Information
|
112
|
+
Lifting Sensitive Data Embedded in Cache
|
113
|
+
Signing Malicious Code
|
114
|
+
Removing Important Client Functionality
|
115
|
+
Removing/short-circuiting 'Purse' logic: removing/mutating 'cash' decrements
|
116
|
+
XSS Using MIME Type Mismatch
|
117
|
+
Exploitation of Trusted Identifiers
|
118
|
+
Functionality Misuse
|
119
|
+
Fuzzing for application mapping
|
120
|
+
Communication Channel Manipulation
|
121
|
+
Exploiting Incorrectly Configured SSL/TLS
|
122
|
+
Spoofing of UDDI/ebXML Messages
|
123
|
+
XML Routing Detour Attacks
|
124
|
+
Exploiting Trust in Client
|
125
|
+
Client-Server Protocol Manipulation
|
126
|
+
Data Serialization External Entities Blowup
|
127
|
+
iFrame Overlay
|
128
|
+
Fingerprinting
|
129
|
+
Session Credential Falsification through Manipulation
|
130
|
+
Sustained Client Engagement
|
131
|
+
DTD Injection
|
132
|
+
Serialized Data Parameter Blowup
|
133
|
+
File Content Injection
|
134
|
+
Serialized Data with Nested Payloads
|
135
|
+
Oversized Serialized Data Payloads
|
136
|
+
Privilege Escalation
|
137
|
+
Hijacking a privileged process
|
138
|
+
Escaping a Sandbox by Calling Code in Another Language
|
139
|
+
Filter Failure through Buffer Overflow
|
140
|
+
Resource Injection
|
141
|
+
Code Injection
|
142
|
+
XSS Targeting HTML Attributes
|
143
|
+
XSS Targeting URI Placeholders
|
144
|
+
XSS Using Doubled Characters
|
145
|
+
XSS Using Invalid Characters
|
146
|
+
Command Injection
|
147
|
+
Forced Deadlock
|
148
|
+
XML Injection
|
149
|
+
Local Code Inclusion
|
150
|
+
PHP Local File Inclusion
|
151
|
+
Remote Code Inclusion
|
152
|
+
SOAP Array Overflow
|
153
|
+
Leveraging Race Conditions
|
154
|
+
Fuzzing for garnering other adjacent user/sensitive data
|
155
|
+
Force Use of Corrupted Files
|
156
|
+
Leverage Alternate Encoding
|
157
|
+
Audit Log Manipulation
|
158
|
+
Leveraging Race Conditions via Symbolic Links
|
159
|
+
Modification of Registry Run Keys
|
160
|
+
Schema Poisoning
|
161
|
+
Protocol Manipulation
|
162
|
+
HTTP Response Smuggling
|
163
|
+
HTTP Verb Tampering
|
164
|
+
DNS Rebinding
|
165
|
+
Inter-component Protocol Manipulation
|
166
|
+
Data Interchange Protocol Manipulation
|
167
|
+
Web Services Protocol Manipulation
|
168
|
+
SOAP Manipulation
|
169
|
+
Fuzzing
|
170
|
+
ICMP Echo Request Ping
|
171
|
+
TCP SYN Scan
|
172
|
+
Leveraging Time-of-Check and Time-of-Use (TOCTOU) Race Conditions
|
173
|
+
Enumerate Mail Exchange (MX) Records
|
174
|
+
DNS Zone Transfers
|
175
|
+
Host Discovery
|
176
|
+
Traceroute Route Enumeration
|
177
|
+
ICMP Address Mask Request
|
178
|
+
Timestamp Request
|
179
|
+
ICMP Information Request
|
180
|
+
TCP ACK Ping
|
181
|
+
UDP Ping
|
182
|
+
TCP SYN Ping
|
183
|
+
Using Leading 'Ghost' Character Sequences to Bypass Input Filters
|
184
|
+
Hijacking a Privileged Thread of Execution
|
185
|
+
Port Scanning
|
186
|
+
TCP Connect Scan
|
187
|
+
TCP FIN Scan
|
188
|
+
TCP Xmas Scan
|
189
|
+
TCP Null Scan
|
190
|
+
TCP ACK Scan
|
191
|
+
TCP Window Scan
|
192
|
+
TCP RPC Scan
|
193
|
+
UDP Scan
|
194
|
+
Network Topology Mapping
|
195
|
+
Accessing/Intercepting/Modifying HTTP Cookies
|
196
|
+
Scanning for Vulnerable Software
|
197
|
+
Active OS Fingerprinting
|
198
|
+
Passive OS Fingerprinting
|
199
|
+
IP ID Sequencing Probe
|
200
|
+
IP 'ID' Echoed Byte-Order Probe
|
201
|
+
IP (DF) 'Don't Fragment Bit' Echoing Probe
|
202
|
+
XSS Through HTTP Query Strings
|
203
|
+
TCP Timestamp Probe
|
204
|
+
TCP Sequence Number Probe
|
205
|
+
TCP (ISN) Greatest Common Divisor Probe
|
206
|
+
TCP (ISN) Counter Rate Probe
|
207
|
+
TCP (ISN) Sequence Predictability Probe
|
208
|
+
TCP Congestion Control Flag (ECN) Probe
|
209
|
+
TCP Initial Window Size Probe
|
210
|
+
TCP Options Probe
|
211
|
+
TCP 'RST' Flag Checksum Probe
|
212
|
+
ICMP Error Message Quoting Probe
|
213
|
+
HTTP Request Smuggling
|
214
|
+
ICMP Error Message Echoing Integrity Probe
|
215
|
+
ICMP IP Total Length Field Probe
|
216
|
+
ICMP IP 'ID' Field Error Message Probe
|
217
|
+
HTTP Response Splitting
|
218
|
+
Leverage Executable Code in Non-Executable Files
|
219
|
+
Using Unpublished Interfaces or Functionality
|
220
|
+
Retrieve Embedded Sensitive Data
|
221
|
+
Leveraging/Manipulating Configuration File Search Paths
|
222
|
+
Harvesting Information via API Event Monitoring
|
223
|
+
Application API Message Manipulation via Man-in-the-Middle
|
224
|
+
Transaction or Event Tampering via Application API Manipulation
|
225
|
+
Application API Navigation Remapping
|
226
|
+
Navigation Remapping To Propagate Malicious Content
|
227
|
+
Application API Button Hijacking
|
228
|
+
Content Spoofing Via Application API Manipulation
|
229
|
+
Manipulating Opaque Client-based Data Tokens
|
230
|
+
Bypassing Physical Security
|
231
|
+
Bypassing Physical Locks
|
232
|
+
Lock Bumping
|
233
|
+
Lock Picking
|
234
|
+
Using a Snap Gun Lock to Force a Lock
|
235
|
+
Bypassing Electronic Locks and Access Controls
|
236
|
+
Cloning Magnetic Strip Cards
|
237
|
+
Magnetic Strip Card Brute Force Attacks
|
238
|
+
Cloning RFID Cards or Chips
|
239
|
+
Using Alternative IP Address Encodings
|
240
|
+
Manipulating Writeable Terminal Devices
|
241
|
+
RFID Chip Deactivation or Destruction
|
242
|
+
Physically Hacking Hardware
|
243
|
+
Bypassing ATA Password Security
|
244
|
+
Dumpster Diving
|
245
|
+
Pretexting
|
246
|
+
Using Meta-characters in E-mail Headers to Inject Malicious Payloads
|
247
|
+
Information Elicitation
|
248
|
+
Pretexting via Customer Service
|
249
|
+
Pretexting via Tech Support
|
250
|
+
Pretexting via Delivery Person
|
251
|
+
Pretexting via Phone
|
252
|
+
Manipulate Human Behavior
|
253
|
+
Influence Perception
|
254
|
+
Influence Perception of Reciprocation
|
255
|
+
MIME Conversion
|
256
|
+
Influence Perception of Scarcity
|
257
|
+
Influence Perception of Authority
|
258
|
+
Influence Perception of Commitment and Consistency
|
259
|
+
Influence Perception of Liking
|
260
|
+
Influence Perception of Consensus or Social Proof
|
261
|
+
Target Influence via Framing
|
262
|
+
Influence via Incentives
|
263
|
+
Influence via Psychological Principles
|
264
|
+
Influence via Modes of Thinking
|
265
|
+
Target Influence via Eye Cues
|
266
|
+
Exploiting Multiple Input Interpretation Layers
|
267
|
+
Target Influence via The Human Buffer Overflow
|
268
|
+
Target Influence via Interview and Interrogation
|
269
|
+
Target Influence via Instant Rapport
|
270
|
+
Modification During Manufacture
|
271
|
+
Manipulation During Distribution
|
272
|
+
Overflow Binary Resource File
|
273
|
+
Hardware Integrity Attack
|
274
|
+
Malicious Logic Insertion
|
275
|
+
Infected Software
|
276
|
+
Malicious Logic Inserted Into Product by Authorized Developer
|
277
|
+
Development Alteration
|
278
|
+
Malicious Logic Insertion into Product Software via Configuration Management Manipulation
|
279
|
+
Malicious Logic Insertion into Product via Inclusion of Third-Party Component
|
280
|
+
Design Alteration
|
281
|
+
Embed Virus into DLL
|
282
|
+
Buffer Overflow via Symbolic Links
|
283
|
+
Infected Hardware
|
284
|
+
Infected Memory
|
285
|
+
USB Memory Attacks
|
286
|
+
Flash Memory Attacks
|
287
|
+
Creating a Rogue Certification Authority Certificate
|
288
|
+
Overflow Variables and Tags
|
289
|
+
HTTP Parameter Pollution (HPP)
|
290
|
+
Web Services API Signature Forgery Leveraging Hash Function Extension Weakness
|
291
|
+
Cross-Domain Search Timing
|
292
|
+
Padding Oracle Crypto Attack
|
293
|
+
Evercookie
|
294
|
+
Transparent Proxy Abuse
|
295
|
+
Leveraging Active Adversary in the Middle Attacks to Bypass Same Origin Policy
|
296
|
+
Cross Site Identification
|
297
|
+
Generic Cross-Browser Cross-Domain Theft
|
298
|
+
HTTP DoS
|
299
|
+
Buffer Overflow via Parameter Expansion
|
300
|
+
Expanding Control over the Operating System from the Database
|
301
|
+
Search Order Hijacking
|
302
|
+
Browser Fingerprinting
|
303
|
+
Signature Spoof
|
304
|
+
Signature Spoofing by Key Theft
|
305
|
+
Signature Spoofing by Improper Validation
|
306
|
+
Signature Spoofing by Misrepresentation
|
307
|
+
Signature Spoofing by Mixing Signed and Unsigned Content
|
308
|
+
Modification of Windows Service Configuration
|
309
|
+
Malicious Root Certificate
|
310
|
+
Passing Local Filenames to Functions That Expect a URL
|
311
|
+
Escaping Virtualization
|
312
|
+
Contradictory Destinations in Traffic Routing Schemes
|
313
|
+
TCP Flood
|
314
|
+
Signature Spoofing by Key Recreation
|
315
|
+
UDP Flood
|
316
|
+
ICMP Flood
|
317
|
+
HTTP Flood
|
318
|
+
SSL Flood
|
319
|
+
Password Brute Forcing
|
320
|
+
Amplification
|
321
|
+
Quadratic Data Expansion
|
322
|
+
Regular Expression Exponential Blowup
|
323
|
+
SOAP Array Blowup
|
324
|
+
TCP Fragmentation
|
325
|
+
UDP Fragmentation
|
326
|
+
ICMP Fragmentation
|
327
|
+
File Discovery
|
328
|
+
Probe iOS Screenshots
|
329
|
+
Android Intent Intercept
|
330
|
+
Blue Boxing
|
331
|
+
Password Recovery Exploitation
|
332
|
+
WebView Injection
|
333
|
+
Android Activity Hijack
|
334
|
+
Intent Spoof
|
335
|
+
WebView Exposure
|
336
|
+
Task Impersonation
|
337
|
+
Scheme Squatting
|
338
|
+
Tapjacking
|
339
|
+
Physical Theft
|
340
|
+
Shoulder Surfing
|
341
|
+
Kerberoasting
|
342
|
+
Poison Web Service Registry
|
343
|
+
SaaS User Request Forgery
|
344
|
+
Infiltration of Software Development Environment
|
345
|
+
Hardware Component Substitution During Baselining
|
346
|
+
Documentation Alteration to Circumvent Dial-down
|
347
|
+
Documentation Alteration to Produce Under-performing Systems
|
348
|
+
Documentation Alteration to Cause Errors in System Design
|
349
|
+
Embedding NULL Bytes
|
350
|
+
Counterfeit Hardware Component Inserted During Product Assembly
|
351
|
+
Hardware Design Specifications Are Altered
|
352
|
+
Malicious Hardware Component Replacement
|
353
|
+
Malicious Software Implanted
|
354
|
+
Rogue Integration Procedures
|
355
|
+
XML Flood
|
356
|
+
Malware-Directed Internal Reconnaissance
|
357
|
+
Postfix, Null Terminate, and Backslash
|
358
|
+
Provide Counterfeit Component
|
359
|
+
Hardware Component Substitution
|
360
|
+
Altered Installed BIOS
|
361
|
+
Malicious Manual Software Update
|
362
|
+
Malicious Hardware Update
|
363
|
+
Malicious Gray Market Hardware
|
364
|
+
Data Injected During Configuration
|
365
|
+
Infiltration of Hardware Development Environment
|
366
|
+
Open-Source Library Manipulation
|
367
|
+
ASIC With Malicious Functionality
|
368
|
+
Query System for Information
|
369
|
+
Overread Buffers
|
370
|
+
Application Fingerprinting
|
371
|
+
Targeted Malware
|
372
|
+
Counterfeit Websites
|
373
|
+
Counterfeit Organizations
|
374
|
+
Pull Data from System Resources
|
375
|
+
Incomplete Data Deletion in a Multi-Tenant Environment
|
376
|
+
Physical Destruction of Device or Component
|
377
|
+
Contaminate Resource
|
378
|
+
Local Execution of Code
|
379
|
+
Rainbow Table Password Cracking
|
380
|
+
Install New Service
|
381
|
+
Modify Existing Service
|
382
|
+
Install Rootkit
|
383
|
+
Functionality Bypass
|
384
|
+
Remote Services with Stolen Credentials
|
385
|
+
Replace File Extension Handlers
|
386
|
+
Replace Trusted Executable
|
387
|
+
Orbital Jamming
|
388
|
+
Use of Known Domain Credentials
|
389
|
+
Windows Admin Shares with Stolen Credentials
|
390
|
+
Modify Shared File
|
391
|
+
Add Malicious File to Shared Webroot
|
392
|
+
Run Software at Logon
|
393
|
+
Password Spraying
|
394
|
+
Capture Credentials via Keylogger
|
395
|
+
Collect Data as Provided by Users
|
396
|
+
Utilizing REST's Trust in the System Resource to Obtain Sensitive Data
|
397
|
+
Block Logging to Central Repository
|
398
|
+
Artificially Inflate File Sizes
|
399
|
+
Process Footprinting
|
400
|
+
Services Footprinting
|
401
|
+
Account Footprinting
|
402
|
+
Group Permission Footprinting
|
403
|
+
Owner Footprinting
|
404
|
+
Disable Security Software
|
405
|
+
Replace Winlogon Helper DLL
|
406
|
+
Restful Privilege Elevation
|
407
|
+
System Footprinting
|
408
|
+
Security Software Footprinting
|
409
|
+
Route Disabling
|
410
|
+
Disabling Network Hardware
|
411
|
+
BGP Route Disabling
|
412
|
+
DNS Domain Seizure
|
413
|
+
Object Injection
|
414
|
+
Cross Frame Scripting (XFS)
|
415
|
+
DOM-Based XSS
|
416
|
+
DNS Blocking
|
417
|
+
Session Credential Falsification through Prediction
|
418
|
+
IP Address Blocking
|
419
|
+
Reflected XSS
|
420
|
+
Stored XSS
|
421
|
+
Session Hijacking
|
422
|
+
Traffic Injection
|
423
|
+
Connection Reset
|
424
|
+
TCP RST Injection
|
425
|
+
Absolute Path Traversal
|
426
|
+
DNS Spoofing
|
427
|
+
Terrestrial Jamming
|
428
|
+
Argument Injection
|
429
|
+
Reusing Session IDs (aka Session Replay)
|
430
|
+
Credential Stuffing
|
431
|
+
Jamming
|
432
|
+
Blockage
|
433
|
+
Wi-Fi Jamming
|
434
|
+
Cellular Jamming
|
435
|
+
Weakening of Cellular Encryption
|
436
|
+
Obstruction
|
437
|
+
Cryptanalysis of Cellular Encryption
|
438
|
+
Cellular Traffic Intercept
|
439
|
+
Session Fixation
|
440
|
+
Cellular Data Injection
|
441
|
+
BitSquatting
|
442
|
+
WiFi MAC Address Tracking
|
443
|
+
WiFi SSID Tracking
|
444
|
+
Rooting SIM Cards
|
445
|
+
Evil Twin Wi-Fi Attack
|
446
|
+
Establish Rogue Location
|
447
|
+
Cellular Rogue Base Station
|
448
|
+
Cellular Broadcast Message Request
|
449
|
+
Signal Strength Tracking
|
450
|
+
Cross Site Request Forgery
|
451
|
+
Drop Encryption Level
|
452
|
+
Analysis of Packet Timing and Sizes
|
453
|
+
Electromagnetic Side-Channel Attack
|
454
|
+
Compromising Emanations Attack
|
455
|
+
Hardware Fault Injection
|
456
|
+
Mobile Device Fault Injection
|
457
|
+
Smudge Attack
|
458
|
+
Counterfeit GPS Signals
|
459
|
+
Carry-Off GPS Attack
|
460
|
+
Cross-Site Scripting (XSS)
|
461
|
+
TypoSquatting
|
462
|
+
SoundSquatting
|
463
|
+
Homograph Attack via Homoglyphs
|
464
|
+
Token Impersonation
|
465
|
+
Probe Audio and Video Peripherals
|
466
|
+
Alternative Execution Due to Deceptive Filenames
|
467
|
+
Hiding Malicious Data or Code within Files
|
468
|
+
Collect Data from Clipboard
|
469
|
+
Altered Component Firmware
|
470
|
+
Probe System Files
|
471
|
+
Using Slashes and URL Encoding Combined to Bypass Validation Logic
|
472
|
+
Inclusion of Code in Existing Process
|
473
|
+
DLL Side-Loading
|
474
|
+
Replace Binaries
|
475
|
+
Identify Shared Files/Directories on System
|
476
|
+
Use of Captured Hashes (Pass The Hash)
|
477
|
+
Use of Captured Tickets (Pass The Ticket)
|
478
|
+
Peripheral Footprinting
|
479
|
+
Collect Data from Registries
|
480
|
+
Collect Data from Screen Capture
|
481
|
+
Adding a Space to a File Extension
|
482
|
+
Sniff Application Code
|
483
|
+
Upload a Web Shell to a Web Server
|
484
|
+
Eavesdropping
|
485
|
+
Use of Known Kerberos Credentials
|
486
|
+
Use of Known Operating System Credentials
|
487
|
+
Credential Prompt Impersonation
|
488
|
+
Avoid Security Tool Identification by Adding Data
|
489
|
+
Voice Phishing
|
490
|
+
Malicious Automated Software Update via Spoofing
|
491
|
+
SQL Injection
|
492
|
+
Root/Jailbreak Detection Evasion via Hooking
|
493
|
+
Root/Jailbreak Detection Evasion via Debugging
|
494
|
+
Adversary in the Browser (AiTB)
|
495
|
+
Exploitation of Transient Instruction Execution
|
496
|
+
Server Side Request Forgery
|
497
|
+
Exploitation of Thunderbolt Protection Flaws
|
498
|
+
BlueSmacking
|
499
|
+
Bluetooth Impersonation AttackS (BIAS)
|
500
|
+
Key Negotiation of Bluetooth Attack (KNOB)
|
501
|
+
Alteration of a Software Update
|
502
|
+
String Format Overflow in syslog()
|
503
|
+
Software Development Tools Maliciously Altered
|
504
|
+
Requirements for ASIC Functionality Maliciously Altered
|
505
|
+
Malicious Code Implanted During Chip Programming
|
506
|
+
Developer Signing Maliciously Altered Software
|
507
|
+
Design for FPGA Maliciously Altered
|
508
|
+
Retrieve Data from Decommissioned Devices
|
509
|
+
NoSQL Injection
|
510
|
+
Server Motherboard Compromise
|
511
|
+
System Build Data Maliciously Altered
|
512
|
+
Exploitation of Improperly Configured or Implemented Memory Protections
|
513
|
+
Subvert Code-signing Facilities
|
514
|
+
Exploitation of Improperly Controlled Registers
|
515
|
+
Exploitation of Improperly Controlled Hardware Security Identifiers
|
516
|
+
Exploitation of Firmware or ROM Code with Unpatchable Vulnerabilities
|
517
|
+
Target Programs with Elevated Privileges
|
518
|
+
Metadata Spoofing
|
519
|
+
Spoof Open-Source Software Metadata
|
520
|
+
Spoof Version Control System Commit Metadata
|
521
|
+
StarJacking
|
522
|
+
System Location Discovery
|
523
|
+
Repo Jacking
|
524
|
+
Load Value Injection
|
525
|
+
DHCP Spoofing
|
526
|
+
Install Malicious Extension
|
527
|
+
Eavesdropping on a Monitor
|
528
|
+
Blind SQL Injection
|
529
|
+
Try Common or Default Usernames and Passwords
|
530
|
+
Network Boundary Bridging
|
531
|
+
Browser in the Middle (BiTM)
|
532
|
+
Exploiting Incorrect Chaining or Granularity of Hardware Debug Components
|
533
|
+
Using Unicode Encoding to Bypass Validation Logic
|
534
|
+
URL Encoding
|
535
|
+
User-Controlled Filename
|
536
|
+
Manipulating State
|
537
|
+
Manipulating Writeable Configuration Files
|
538
|
+
Manipulating Web Input to File System Calls
|
539
|
+
Manipulating User-Controlled Variables
|
540
|
+
Using Escaped Slashes in Alternate Encoding
|
541
|
+
Using Slashes in Alternate Encoding
|
542
|
+
Buffer Overflow in an API Call
|
543
|
+
Using UTF-8 Encoding to Bypass Validation Logic
|
544
|
+
Web Server Logs Tampering
|
545
|
+
XPath Injection
|
546
|
+
XQuery Injection
|
547
|
+
AJAX Footprinting
|
548
|
+
XSS Through HTTP Headers
|
549
|
+
Forceful Browsing
|
550
|
+
OS Command Injection
|
551
|
+
Pharming
|
552
|
+
Buffer Overflow in Local Command-Line Utilities
|
553
|
+
Reflection Attack in Authentication Protocol
|
554
|
+
Forced Integer Overflow
|
555
|
+
Log Injection-Tampering-Forging
|
556
|
+
Adversary in the Middle (AiTM)
|
557
|
+
WSDL Scanning
|
558
|
+
Block Access to Libraries
|
559
|
+
Cryptanalysis
|
560
|
+
Phishing
|