txt2stix 0.0.4__py3-none-any.whl

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (119) hide show
  1. txt2stix/__init__.py +33 -0
  2. txt2stix/ai_extractor/__init__.py +15 -0
  3. txt2stix/ai_extractor/anthropic.py +12 -0
  4. txt2stix/ai_extractor/base.py +87 -0
  5. txt2stix/ai_extractor/deepseek.py +19 -0
  6. txt2stix/ai_extractor/gemini.py +18 -0
  7. txt2stix/ai_extractor/openai.py +15 -0
  8. txt2stix/ai_extractor/openrouter.py +20 -0
  9. txt2stix/ai_extractor/prompts.py +164 -0
  10. txt2stix/ai_extractor/utils.py +85 -0
  11. txt2stix/attack_flow.py +101 -0
  12. txt2stix/bundler.py +428 -0
  13. txt2stix/common.py +23 -0
  14. txt2stix/extractions.py +59 -0
  15. txt2stix/includes/__init__.py +0 -0
  16. txt2stix/includes/extractions/ai/config.yaml +1023 -0
  17. txt2stix/includes/extractions/lookup/config.yaml +393 -0
  18. txt2stix/includes/extractions/pattern/config.yaml +609 -0
  19. txt2stix/includes/helpers/mimetype_filename_extension_list.csv +936 -0
  20. txt2stix/includes/helpers/stix_relationship_types.txt +41 -0
  21. txt2stix/includes/helpers/tlds.txt +1446 -0
  22. txt2stix/includes/helpers/windows_registry_key_prefix.txt +12 -0
  23. txt2stix/includes/lookups/_README.md +11 -0
  24. txt2stix/includes/lookups/_generate_lookups.py +247 -0
  25. txt2stix/includes/lookups/attack_pattern.txt +1 -0
  26. txt2stix/includes/lookups/campaign.txt +1 -0
  27. txt2stix/includes/lookups/country_iso3166_alpha2.txt +249 -0
  28. txt2stix/includes/lookups/course_of_action.txt +1 -0
  29. txt2stix/includes/lookups/disarm_id_v1_5.txt +345 -0
  30. txt2stix/includes/lookups/disarm_name_v1_5.txt +347 -0
  31. txt2stix/includes/lookups/extensions.txt +78 -0
  32. txt2stix/includes/lookups/identity.txt +1 -0
  33. txt2stix/includes/lookups/infrastructure.txt +1 -0
  34. txt2stix/includes/lookups/intrusion_set.txt +1 -0
  35. txt2stix/includes/lookups/malware.txt +2 -0
  36. txt2stix/includes/lookups/mitre_atlas_id_v4_5_2.txt +116 -0
  37. txt2stix/includes/lookups/mitre_atlas_name_v4_5_2.txt +117 -0
  38. txt2stix/includes/lookups/mitre_attack_enterprise_aliases_v16_0.txt +1502 -0
  39. txt2stix/includes/lookups/mitre_attack_enterprise_id_v16_0.txt +1656 -0
  40. txt2stix/includes/lookups/mitre_attack_enterprise_name_v16_0.txt +1765 -0
  41. txt2stix/includes/lookups/mitre_attack_ics_aliases_v16_0.txt +141 -0
  42. txt2stix/includes/lookups/mitre_attack_ics_id_v16_0.txt +254 -0
  43. txt2stix/includes/lookups/mitre_attack_ics_name_v16_0.txt +293 -0
  44. txt2stix/includes/lookups/mitre_attack_mobile_aliases_v16_0.txt +159 -0
  45. txt2stix/includes/lookups/mitre_attack_mobile_id_v16_0.txt +277 -0
  46. txt2stix/includes/lookups/mitre_attack_mobile_name_v16_0.txt +296 -0
  47. txt2stix/includes/lookups/mitre_capec_id_v3_9.txt +559 -0
  48. txt2stix/includes/lookups/mitre_capec_name_v3_9.txt +560 -0
  49. txt2stix/includes/lookups/mitre_cwe_id_v4_15.txt +939 -0
  50. txt2stix/includes/lookups/mitre_cwe_name_v4_15.txt +939 -0
  51. txt2stix/includes/lookups/threat_actor.txt +1 -0
  52. txt2stix/includes/lookups/tld.txt +1422 -0
  53. txt2stix/includes/lookups/tool.txt +1 -0
  54. txt2stix/includes/tests/test_cases.yaml +695 -0
  55. txt2stix/indicator.py +860 -0
  56. txt2stix/lookups.py +68 -0
  57. txt2stix/pattern/__init__.py +13 -0
  58. txt2stix/pattern/extractors/__init__.py +0 -0
  59. txt2stix/pattern/extractors/base_extractor.py +167 -0
  60. txt2stix/pattern/extractors/card/README.md +34 -0
  61. txt2stix/pattern/extractors/card/__init__.py +15 -0
  62. txt2stix/pattern/extractors/card/amex_card_extractor.py +52 -0
  63. txt2stix/pattern/extractors/card/diners_card_extractor.py +47 -0
  64. txt2stix/pattern/extractors/card/discover_card_extractor.py +48 -0
  65. txt2stix/pattern/extractors/card/jcb_card_extractor.py +43 -0
  66. txt2stix/pattern/extractors/card/master_card_extractor.py +63 -0
  67. txt2stix/pattern/extractors/card/union_card_extractor.py +38 -0
  68. txt2stix/pattern/extractors/card/visa_card_extractor.py +46 -0
  69. txt2stix/pattern/extractors/crypto/__init__.py +3 -0
  70. txt2stix/pattern/extractors/crypto/btc_extractor.py +38 -0
  71. txt2stix/pattern/extractors/directory/__init__.py +10 -0
  72. txt2stix/pattern/extractors/directory/unix_directory_extractor.py +40 -0
  73. txt2stix/pattern/extractors/directory/unix_file_path_extractor.py +42 -0
  74. txt2stix/pattern/extractors/directory/windows_directory_path_extractor.py +47 -0
  75. txt2stix/pattern/extractors/directory/windows_file_path_extractor.py +42 -0
  76. txt2stix/pattern/extractors/domain/__init__.py +8 -0
  77. txt2stix/pattern/extractors/domain/domain_extractor.py +39 -0
  78. txt2stix/pattern/extractors/domain/hostname_extractor.py +36 -0
  79. txt2stix/pattern/extractors/domain/sub_domain_extractor.py +49 -0
  80. txt2stix/pattern/extractors/hashes/__init__.py +16 -0
  81. txt2stix/pattern/extractors/hashes/md5_extractor.py +16 -0
  82. txt2stix/pattern/extractors/hashes/sha1_extractor.py +14 -0
  83. txt2stix/pattern/extractors/hashes/sha224_extractor.py +18 -0
  84. txt2stix/pattern/extractors/hashes/sha2_256_exactor.py +14 -0
  85. txt2stix/pattern/extractors/hashes/sha2_512_exactor.py +13 -0
  86. txt2stix/pattern/extractors/hashes/sha3_256_exactor.py +15 -0
  87. txt2stix/pattern/extractors/hashes/sha3_512_exactor.py +16 -0
  88. txt2stix/pattern/extractors/helper.py +64 -0
  89. txt2stix/pattern/extractors/ip/__init__.py +14 -0
  90. txt2stix/pattern/extractors/ip/ipv4_cidr_extractor.py +49 -0
  91. txt2stix/pattern/extractors/ip/ipv4_extractor.py +18 -0
  92. txt2stix/pattern/extractors/ip/ipv4_port_extractor.py +42 -0
  93. txt2stix/pattern/extractors/ip/ipv6_cidr_extractor.py +18 -0
  94. txt2stix/pattern/extractors/ip/ipv6_extractor.py +16 -0
  95. txt2stix/pattern/extractors/ip/ipv6_port_extractor.py +46 -0
  96. txt2stix/pattern/extractors/others/__init__.py +22 -0
  97. txt2stix/pattern/extractors/others/asn_extractor.py +14 -0
  98. txt2stix/pattern/extractors/others/cpe_extractor.py +29 -0
  99. txt2stix/pattern/extractors/others/cve_extractor.py +14 -0
  100. txt2stix/pattern/extractors/others/email_extractor.py +21 -0
  101. txt2stix/pattern/extractors/others/filename_extractor.py +17 -0
  102. txt2stix/pattern/extractors/others/iban_extractor.py +15 -0
  103. txt2stix/pattern/extractors/others/mac_address_extractor.py +13 -0
  104. txt2stix/pattern/extractors/others/phonenumber_extractor.py +41 -0
  105. txt2stix/pattern/extractors/others/user_agent_extractor.py +20 -0
  106. txt2stix/pattern/extractors/others/windows_registry_key_extractor.py +18 -0
  107. txt2stix/pattern/extractors/url/__init__.py +7 -0
  108. txt2stix/pattern/extractors/url/url_extractor.py +22 -0
  109. txt2stix/pattern/extractors/url/url_file_extractor.py +21 -0
  110. txt2stix/pattern/extractors/url/url_path_extractor.py +74 -0
  111. txt2stix/retriever.py +126 -0
  112. txt2stix/stix.py +1 -0
  113. txt2stix/txt2stix.py +336 -0
  114. txt2stix/utils.py +86 -0
  115. txt2stix-0.0.4.dist-info/METADATA +190 -0
  116. txt2stix-0.0.4.dist-info/RECORD +119 -0
  117. txt2stix-0.0.4.dist-info/WHEEL +4 -0
  118. txt2stix-0.0.4.dist-info/entry_points.txt +2 -0
  119. txt2stix-0.0.4.dist-info/licenses/LICENSE +202 -0
@@ -0,0 +1,560 @@
1
+ The MITRE Corporation
2
+ Accessing Functionality Not Properly Constrained by ACLs
3
+ Buffer Overflow via Environment Variables
4
+ Overflow Buffers
5
+ Server Side Include (SSI) Injection
6
+ Session Sidejacking
7
+ Clickjacking
8
+ Cross Zone Scripting
9
+ HTTP Request Splitting
10
+ Cross Site Tracing
11
+ Command Line Execution through SQL Injection
12
+ Object Relational Mapping Injection
13
+ Cause Web Server Misclassification
14
+ SQL Injection through SOAP Parameter Tampering
15
+ JSON Hijacking (aka JavaScript Hijacking)
16
+ Brute Force
17
+ Interface Manipulation
18
+ Authentication Abuse
19
+ Authentication Bypass
20
+ Excavation
21
+ Interception
22
+ Choosing Message Identifier
23
+ Double Encoding
24
+ Exploit Non-Production Interfaces
25
+ Privilege Abuse
26
+ Buffer Manipulation
27
+ Shared Resource Manipulation
28
+ Flooding
29
+ Path Traversal
30
+ Directory Indexing
31
+ Integer Attacks
32
+ Pointer Manipulation
33
+ Subverting Environment Variable Values
34
+ Excessive Allocation
35
+ Resource Leak Exposure
36
+ Symlink Attack
37
+ Try All Common Switches
38
+ Email Injection
39
+ Format String Injection
40
+ LDAP Injection
41
+ Parameter Injection
42
+ Reflection Injection
43
+ Relative Path Traversal
44
+ Client-side Injection-induced Buffer Overflow
45
+ Bypassing of Intermediate Forms in Multiple-Form Sets
46
+ Cache Poisoning
47
+ DNS Cache Poisoning
48
+ Detect Unpublicized Web Pages
49
+ Detect Unpublicized Web Services
50
+ Checksum Spoofing
51
+ XML Schema Poisoning
52
+ XML Ping of the Death
53
+ Content Spoofing
54
+ Explore for Predictable Temporary File Names
55
+ Command Delimiters
56
+ Collect Data from Common Resource Locations
57
+ Identity Spoofing
58
+ Input Data Manipulation
59
+ Resource Location Spoofing
60
+ Screen Temporary Files for Sensitive Information
61
+ Sniffing Attacks
62
+ Sniffing Network Traffic
63
+ Redirect Access to Libraries
64
+ Dictionary-based Password Attack
65
+ Exploit Script-Based APIs
66
+ Infrastructure Manipulation
67
+ Manipulating Hidden Fields
68
+ Spear Phishing
69
+ Mobile Phishing
70
+ File Manipulation
71
+ Force the System to Reset Values
72
+ White Box Reverse Engineering
73
+ Windows ::DATA Alternate Data Stream
74
+ Footprinting
75
+ Using Malicious Files
76
+ Web Application Fingerprinting
77
+ Action Spoofing
78
+ Flash Parameter Injection
79
+ Code Inclusion
80
+ Configuration/Environment Manipulation
81
+ Create files with the same name as files protected with a higher classification
82
+ Cross-Site Flashing
83
+ Calling Micro-Services Directly
84
+ XSS Targeting Non-Script Elements
85
+ Exploiting Incorrectly Configured Access Control Security Levels
86
+ Flash File Overlay
87
+ Flash Injection
88
+ IMAP/SMTP Command Injection
89
+ Software Integrity Attack
90
+ Malicious Software Download
91
+ Malicious Software Update
92
+ Malicious Automated Software Update via Redirection
93
+ Reverse Engineering
94
+ Black Box Reverse Engineering
95
+ Embedding Scripts within Scripts
96
+ Reverse Engineer an Executable to Expose Assumed Hidden Functionality
97
+ Read Sensitive Constants Within an Executable
98
+ Protocol Analysis
99
+ PHP Remote File Inclusion
100
+ Fake the Source of Data
101
+ Principal Spoof
102
+ Session Credential Falsification through Forging
103
+ Exponential Data Expansion
104
+ XSS Targeting Error Pages
105
+ XSS Using Alternate Syntax
106
+ Inducing Account Lockout
107
+ Encryption Brute Forcing
108
+ Removal of filters: Input filters, output filters, data masking
109
+ Serialized Data External Linking
110
+ Create Malicious Client
111
+ Manipulate Registry Information
112
+ Lifting Sensitive Data Embedded in Cache
113
+ Signing Malicious Code
114
+ Removing Important Client Functionality
115
+ Removing/short-circuiting 'Purse' logic: removing/mutating 'cash' decrements
116
+ XSS Using MIME Type Mismatch
117
+ Exploitation of Trusted Identifiers
118
+ Functionality Misuse
119
+ Fuzzing for application mapping
120
+ Communication Channel Manipulation
121
+ Exploiting Incorrectly Configured SSL/TLS
122
+ Spoofing of UDDI/ebXML Messages
123
+ XML Routing Detour Attacks
124
+ Exploiting Trust in Client
125
+ Client-Server Protocol Manipulation
126
+ Data Serialization External Entities Blowup
127
+ iFrame Overlay
128
+ Fingerprinting
129
+ Session Credential Falsification through Manipulation
130
+ Sustained Client Engagement
131
+ DTD Injection
132
+ Serialized Data Parameter Blowup
133
+ File Content Injection
134
+ Serialized Data with Nested Payloads
135
+ Oversized Serialized Data Payloads
136
+ Privilege Escalation
137
+ Hijacking a privileged process
138
+ Escaping a Sandbox by Calling Code in Another Language
139
+ Filter Failure through Buffer Overflow
140
+ Resource Injection
141
+ Code Injection
142
+ XSS Targeting HTML Attributes
143
+ XSS Targeting URI Placeholders
144
+ XSS Using Doubled Characters
145
+ XSS Using Invalid Characters
146
+ Command Injection
147
+ Forced Deadlock
148
+ XML Injection
149
+ Local Code Inclusion
150
+ PHP Local File Inclusion
151
+ Remote Code Inclusion
152
+ SOAP Array Overflow
153
+ Leveraging Race Conditions
154
+ Fuzzing for garnering other adjacent user/sensitive data
155
+ Force Use of Corrupted Files
156
+ Leverage Alternate Encoding
157
+ Audit Log Manipulation
158
+ Leveraging Race Conditions via Symbolic Links
159
+ Modification of Registry Run Keys
160
+ Schema Poisoning
161
+ Protocol Manipulation
162
+ HTTP Response Smuggling
163
+ HTTP Verb Tampering
164
+ DNS Rebinding
165
+ Inter-component Protocol Manipulation
166
+ Data Interchange Protocol Manipulation
167
+ Web Services Protocol Manipulation
168
+ SOAP Manipulation
169
+ Fuzzing
170
+ ICMP Echo Request Ping
171
+ TCP SYN Scan
172
+ Leveraging Time-of-Check and Time-of-Use (TOCTOU) Race Conditions
173
+ Enumerate Mail Exchange (MX) Records
174
+ DNS Zone Transfers
175
+ Host Discovery
176
+ Traceroute Route Enumeration
177
+ ICMP Address Mask Request
178
+ Timestamp Request
179
+ ICMP Information Request
180
+ TCP ACK Ping
181
+ UDP Ping
182
+ TCP SYN Ping
183
+ Using Leading 'Ghost' Character Sequences to Bypass Input Filters
184
+ Hijacking a Privileged Thread of Execution
185
+ Port Scanning
186
+ TCP Connect Scan
187
+ TCP FIN Scan
188
+ TCP Xmas Scan
189
+ TCP Null Scan
190
+ TCP ACK Scan
191
+ TCP Window Scan
192
+ TCP RPC Scan
193
+ UDP Scan
194
+ Network Topology Mapping
195
+ Accessing/Intercepting/Modifying HTTP Cookies
196
+ Scanning for Vulnerable Software
197
+ Active OS Fingerprinting
198
+ Passive OS Fingerprinting
199
+ IP ID Sequencing Probe
200
+ IP 'ID' Echoed Byte-Order Probe
201
+ IP (DF) 'Don't Fragment Bit' Echoing Probe
202
+ XSS Through HTTP Query Strings
203
+ TCP Timestamp Probe
204
+ TCP Sequence Number Probe
205
+ TCP (ISN) Greatest Common Divisor Probe
206
+ TCP (ISN) Counter Rate Probe
207
+ TCP (ISN) Sequence Predictability Probe
208
+ TCP Congestion Control Flag (ECN) Probe
209
+ TCP Initial Window Size Probe
210
+ TCP Options Probe
211
+ TCP 'RST' Flag Checksum Probe
212
+ ICMP Error Message Quoting Probe
213
+ HTTP Request Smuggling
214
+ ICMP Error Message Echoing Integrity Probe
215
+ ICMP IP Total Length Field Probe
216
+ ICMP IP 'ID' Field Error Message Probe
217
+ HTTP Response Splitting
218
+ Leverage Executable Code in Non-Executable Files
219
+ Using Unpublished Interfaces or Functionality
220
+ Retrieve Embedded Sensitive Data
221
+ Leveraging/Manipulating Configuration File Search Paths
222
+ Harvesting Information via API Event Monitoring
223
+ Application API Message Manipulation via Man-in-the-Middle
224
+ Transaction or Event Tampering via Application API Manipulation
225
+ Application API Navigation Remapping
226
+ Navigation Remapping To Propagate Malicious Content
227
+ Application API Button Hijacking
228
+ Content Spoofing Via Application API Manipulation
229
+ Manipulating Opaque Client-based Data Tokens
230
+ Bypassing Physical Security
231
+ Bypassing Physical Locks
232
+ Lock Bumping
233
+ Lock Picking
234
+ Using a Snap Gun Lock to Force a Lock
235
+ Bypassing Electronic Locks and Access Controls
236
+ Cloning Magnetic Strip Cards
237
+ Magnetic Strip Card Brute Force Attacks
238
+ Cloning RFID Cards or Chips
239
+ Using Alternative IP Address Encodings
240
+ Manipulating Writeable Terminal Devices
241
+ RFID Chip Deactivation or Destruction
242
+ Physically Hacking Hardware
243
+ Bypassing ATA Password Security
244
+ Dumpster Diving
245
+ Pretexting
246
+ Using Meta-characters in E-mail Headers to Inject Malicious Payloads
247
+ Information Elicitation
248
+ Pretexting via Customer Service
249
+ Pretexting via Tech Support
250
+ Pretexting via Delivery Person
251
+ Pretexting via Phone
252
+ Manipulate Human Behavior
253
+ Influence Perception
254
+ Influence Perception of Reciprocation
255
+ MIME Conversion
256
+ Influence Perception of Scarcity
257
+ Influence Perception of Authority
258
+ Influence Perception of Commitment and Consistency
259
+ Influence Perception of Liking
260
+ Influence Perception of Consensus or Social Proof
261
+ Target Influence via Framing
262
+ Influence via Incentives
263
+ Influence via Psychological Principles
264
+ Influence via Modes of Thinking
265
+ Target Influence via Eye Cues
266
+ Exploiting Multiple Input Interpretation Layers
267
+ Target Influence via The Human Buffer Overflow
268
+ Target Influence via Interview and Interrogation
269
+ Target Influence via Instant Rapport
270
+ Modification During Manufacture
271
+ Manipulation During Distribution
272
+ Overflow Binary Resource File
273
+ Hardware Integrity Attack
274
+ Malicious Logic Insertion
275
+ Infected Software
276
+ Malicious Logic Inserted Into Product by Authorized Developer
277
+ Development Alteration
278
+ Malicious Logic Insertion into Product Software via Configuration Management Manipulation
279
+ Malicious Logic Insertion into Product via Inclusion of Third-Party Component
280
+ Design Alteration
281
+ Embed Virus into DLL
282
+ Buffer Overflow via Symbolic Links
283
+ Infected Hardware
284
+ Infected Memory
285
+ USB Memory Attacks
286
+ Flash Memory Attacks
287
+ Creating a Rogue Certification Authority Certificate
288
+ Overflow Variables and Tags
289
+ HTTP Parameter Pollution (HPP)
290
+ Web Services API Signature Forgery Leveraging Hash Function Extension Weakness
291
+ Cross-Domain Search Timing
292
+ Padding Oracle Crypto Attack
293
+ Evercookie
294
+ Transparent Proxy Abuse
295
+ Leveraging Active Adversary in the Middle Attacks to Bypass Same Origin Policy
296
+ Cross Site Identification
297
+ Generic Cross-Browser Cross-Domain Theft
298
+ HTTP DoS
299
+ Buffer Overflow via Parameter Expansion
300
+ Expanding Control over the Operating System from the Database
301
+ Search Order Hijacking
302
+ Browser Fingerprinting
303
+ Signature Spoof
304
+ Signature Spoofing by Key Theft
305
+ Signature Spoofing by Improper Validation
306
+ Signature Spoofing by Misrepresentation
307
+ Signature Spoofing by Mixing Signed and Unsigned Content
308
+ Modification of Windows Service Configuration
309
+ Malicious Root Certificate
310
+ Passing Local Filenames to Functions That Expect a URL
311
+ Escaping Virtualization
312
+ Contradictory Destinations in Traffic Routing Schemes
313
+ TCP Flood
314
+ Signature Spoofing by Key Recreation
315
+ UDP Flood
316
+ ICMP Flood
317
+ HTTP Flood
318
+ SSL Flood
319
+ Password Brute Forcing
320
+ Amplification
321
+ Quadratic Data Expansion
322
+ Regular Expression Exponential Blowup
323
+ SOAP Array Blowup
324
+ TCP Fragmentation
325
+ UDP Fragmentation
326
+ ICMP Fragmentation
327
+ File Discovery
328
+ Probe iOS Screenshots
329
+ Android Intent Intercept
330
+ Blue Boxing
331
+ Password Recovery Exploitation
332
+ WebView Injection
333
+ Android Activity Hijack
334
+ Intent Spoof
335
+ WebView Exposure
336
+ Task Impersonation
337
+ Scheme Squatting
338
+ Tapjacking
339
+ Physical Theft
340
+ Shoulder Surfing
341
+ Kerberoasting
342
+ Poison Web Service Registry
343
+ SaaS User Request Forgery
344
+ Infiltration of Software Development Environment
345
+ Hardware Component Substitution During Baselining
346
+ Documentation Alteration to Circumvent Dial-down
347
+ Documentation Alteration to Produce Under-performing Systems
348
+ Documentation Alteration to Cause Errors in System Design
349
+ Embedding NULL Bytes
350
+ Counterfeit Hardware Component Inserted During Product Assembly
351
+ Hardware Design Specifications Are Altered
352
+ Malicious Hardware Component Replacement
353
+ Malicious Software Implanted
354
+ Rogue Integration Procedures
355
+ XML Flood
356
+ Malware-Directed Internal Reconnaissance
357
+ Postfix, Null Terminate, and Backslash
358
+ Provide Counterfeit Component
359
+ Hardware Component Substitution
360
+ Altered Installed BIOS
361
+ Malicious Manual Software Update
362
+ Malicious Hardware Update
363
+ Malicious Gray Market Hardware
364
+ Data Injected During Configuration
365
+ Infiltration of Hardware Development Environment
366
+ Open-Source Library Manipulation
367
+ ASIC With Malicious Functionality
368
+ Query System for Information
369
+ Overread Buffers
370
+ Application Fingerprinting
371
+ Targeted Malware
372
+ Counterfeit Websites
373
+ Counterfeit Organizations
374
+ Pull Data from System Resources
375
+ Incomplete Data Deletion in a Multi-Tenant Environment
376
+ Physical Destruction of Device or Component
377
+ Contaminate Resource
378
+ Local Execution of Code
379
+ Rainbow Table Password Cracking
380
+ Install New Service
381
+ Modify Existing Service
382
+ Install Rootkit
383
+ Functionality Bypass
384
+ Remote Services with Stolen Credentials
385
+ Replace File Extension Handlers
386
+ Replace Trusted Executable
387
+ Orbital Jamming
388
+ Use of Known Domain Credentials
389
+ Windows Admin Shares with Stolen Credentials
390
+ Modify Shared File
391
+ Add Malicious File to Shared Webroot
392
+ Run Software at Logon
393
+ Password Spraying
394
+ Capture Credentials via Keylogger
395
+ Collect Data as Provided by Users
396
+ Utilizing REST's Trust in the System Resource to Obtain Sensitive Data
397
+ Block Logging to Central Repository
398
+ Artificially Inflate File Sizes
399
+ Process Footprinting
400
+ Services Footprinting
401
+ Account Footprinting
402
+ Group Permission Footprinting
403
+ Owner Footprinting
404
+ Disable Security Software
405
+ Replace Winlogon Helper DLL
406
+ Restful Privilege Elevation
407
+ System Footprinting
408
+ Security Software Footprinting
409
+ Route Disabling
410
+ Disabling Network Hardware
411
+ BGP Route Disabling
412
+ DNS Domain Seizure
413
+ Object Injection
414
+ Cross Frame Scripting (XFS)
415
+ DOM-Based XSS
416
+ DNS Blocking
417
+ Session Credential Falsification through Prediction
418
+ IP Address Blocking
419
+ Reflected XSS
420
+ Stored XSS
421
+ Session Hijacking
422
+ Traffic Injection
423
+ Connection Reset
424
+ TCP RST Injection
425
+ Absolute Path Traversal
426
+ DNS Spoofing
427
+ Terrestrial Jamming
428
+ Argument Injection
429
+ Reusing Session IDs (aka Session Replay)
430
+ Credential Stuffing
431
+ Jamming
432
+ Blockage
433
+ Wi-Fi Jamming
434
+ Cellular Jamming
435
+ Weakening of Cellular Encryption
436
+ Obstruction
437
+ Cryptanalysis of Cellular Encryption
438
+ Cellular Traffic Intercept
439
+ Session Fixation
440
+ Cellular Data Injection
441
+ BitSquatting
442
+ WiFi MAC Address Tracking
443
+ WiFi SSID Tracking
444
+ Rooting SIM Cards
445
+ Evil Twin Wi-Fi Attack
446
+ Establish Rogue Location
447
+ Cellular Rogue Base Station
448
+ Cellular Broadcast Message Request
449
+ Signal Strength Tracking
450
+ Cross Site Request Forgery
451
+ Drop Encryption Level
452
+ Analysis of Packet Timing and Sizes
453
+ Electromagnetic Side-Channel Attack
454
+ Compromising Emanations Attack
455
+ Hardware Fault Injection
456
+ Mobile Device Fault Injection
457
+ Smudge Attack
458
+ Counterfeit GPS Signals
459
+ Carry-Off GPS Attack
460
+ Cross-Site Scripting (XSS)
461
+ TypoSquatting
462
+ SoundSquatting
463
+ Homograph Attack via Homoglyphs
464
+ Token Impersonation
465
+ Probe Audio and Video Peripherals
466
+ Alternative Execution Due to Deceptive Filenames
467
+ Hiding Malicious Data or Code within Files
468
+ Collect Data from Clipboard
469
+ Altered Component Firmware
470
+ Probe System Files
471
+ Using Slashes and URL Encoding Combined to Bypass Validation Logic
472
+ Inclusion of Code in Existing Process
473
+ DLL Side-Loading
474
+ Replace Binaries
475
+ Identify Shared Files/Directories on System
476
+ Use of Captured Hashes (Pass The Hash)
477
+ Use of Captured Tickets (Pass The Ticket)
478
+ Peripheral Footprinting
479
+ Collect Data from Registries
480
+ Collect Data from Screen Capture
481
+ Adding a Space to a File Extension
482
+ Sniff Application Code
483
+ Upload a Web Shell to a Web Server
484
+ Eavesdropping
485
+ Use of Known Kerberos Credentials
486
+ Use of Known Operating System Credentials
487
+ Credential Prompt Impersonation
488
+ Avoid Security Tool Identification by Adding Data
489
+ Voice Phishing
490
+ Malicious Automated Software Update via Spoofing
491
+ SQL Injection
492
+ Root/Jailbreak Detection Evasion via Hooking
493
+ Root/Jailbreak Detection Evasion via Debugging
494
+ Adversary in the Browser (AiTB)
495
+ Exploitation of Transient Instruction Execution
496
+ Server Side Request Forgery
497
+ Exploitation of Thunderbolt Protection Flaws
498
+ BlueSmacking
499
+ Bluetooth Impersonation AttackS (BIAS)
500
+ Key Negotiation of Bluetooth Attack (KNOB)
501
+ Alteration of a Software Update
502
+ String Format Overflow in syslog()
503
+ Software Development Tools Maliciously Altered
504
+ Requirements for ASIC Functionality Maliciously Altered
505
+ Malicious Code Implanted During Chip Programming
506
+ Developer Signing Maliciously Altered Software
507
+ Design for FPGA Maliciously Altered
508
+ Retrieve Data from Decommissioned Devices
509
+ NoSQL Injection
510
+ Server Motherboard Compromise
511
+ System Build Data Maliciously Altered
512
+ Exploitation of Improperly Configured or Implemented Memory Protections
513
+ Subvert Code-signing Facilities
514
+ Exploitation of Improperly Controlled Registers
515
+ Exploitation of Improperly Controlled Hardware Security Identifiers
516
+ Exploitation of Firmware or ROM Code with Unpatchable Vulnerabilities
517
+ Target Programs with Elevated Privileges
518
+ Metadata Spoofing
519
+ Spoof Open-Source Software Metadata
520
+ Spoof Version Control System Commit Metadata
521
+ StarJacking
522
+ System Location Discovery
523
+ Repo Jacking
524
+ Load Value Injection
525
+ DHCP Spoofing
526
+ Install Malicious Extension
527
+ Eavesdropping on a Monitor
528
+ Blind SQL Injection
529
+ Try Common or Default Usernames and Passwords
530
+ Network Boundary Bridging
531
+ Browser in the Middle (BiTM)
532
+ Exploiting Incorrect Chaining or Granularity of Hardware Debug Components
533
+ Using Unicode Encoding to Bypass Validation Logic
534
+ URL Encoding
535
+ User-Controlled Filename
536
+ Manipulating State
537
+ Manipulating Writeable Configuration Files
538
+ Manipulating Web Input to File System Calls
539
+ Manipulating User-Controlled Variables
540
+ Using Escaped Slashes in Alternate Encoding
541
+ Using Slashes in Alternate Encoding
542
+ Buffer Overflow in an API Call
543
+ Using UTF-8 Encoding to Bypass Validation Logic
544
+ Web Server Logs Tampering
545
+ XPath Injection
546
+ XQuery Injection
547
+ AJAX Footprinting
548
+ XSS Through HTTP Headers
549
+ Forceful Browsing
550
+ OS Command Injection
551
+ Pharming
552
+ Buffer Overflow in Local Command-Line Utilities
553
+ Reflection Attack in Authentication Protocol
554
+ Forced Integer Overflow
555
+ Log Injection-Tampering-Forging
556
+ Adversary in the Middle (AiTM)
557
+ WSDL Scanning
558
+ Block Access to Libraries
559
+ Cryptanalysis
560
+ Phishing