txt2stix 1.1.8__py3-none-any.whl → 1.1.9__py3-none-any.whl

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (33) hide show
  1. txt2stix/includes/extractions/ai/config.yaml +20 -0
  2. txt2stix/includes/extractions/lookup/config.yaml +33 -15
  3. txt2stix/includes/lookups/_generate_lookups.py +39 -30
  4. txt2stix/includes/lookups/{disarm_id_v1_5.txt → disarm_id_v1_6.txt} +95 -32
  5. txt2stix/includes/lookups/{disarm_name_v1_5.txt → disarm_name_v1_6.txt} +380 -317
  6. txt2stix/includes/lookups/{mitre_atlas_id_v4_5_2.txt → mitre_atlas_id_v4_9_0.txt} +41 -1
  7. txt2stix/includes/lookups/mitre_atlas_name_v4_9_0.txt +157 -0
  8. txt2stix/includes/lookups/{mitre_attack_enterprise_aliases_v16_0.txt → mitre_attack_enterprise_aliases_v18_0.txt} +679 -531
  9. txt2stix/includes/lookups/mitre_attack_enterprise_id_v18_0.txt +4293 -0
  10. txt2stix/includes/lookups/mitre_attack_enterprise_name_v18_0.txt +4295 -0
  11. txt2stix/includes/lookups/{mitre_attack_ics_aliases_v16_0.txt → mitre_attack_ics_aliases_v18_0.txt} +7 -3
  12. txt2stix/includes/lookups/mitre_attack_ics_id_v18_0.txt +410 -0
  13. txt2stix/includes/lookups/{mitre_attack_ics_name_v16_0.txt → mitre_attack_ics_name_v18_0.txt} +172 -53
  14. txt2stix/includes/lookups/{mitre_attack_mobile_aliases_v16_0.txt → mitre_attack_mobile_aliases_v18_0.txt} +33 -0
  15. txt2stix/includes/lookups/mitre_attack_mobile_id_v18_0.txt +643 -0
  16. txt2stix/includes/lookups/mitre_attack_mobile_name_v18_0.txt +645 -0
  17. txt2stix/includes/lookups/mitre_capec_name_v3_9.txt +522 -522
  18. txt2stix/includes/lookups/{mitre_cwe_id_v4_15.txt → mitre_cwe_id_v4_18.txt} +5 -0
  19. txt2stix/includes/lookups/{mitre_cwe_name_v4_15.txt → mitre_cwe_name_v4_18.txt} +889 -884
  20. txt2stix/includes/lookups/sector_aliases_v1_0.txt +751 -0
  21. txt2stix/includes/tests/test_cases.yaml +8 -0
  22. txt2stix/retriever.py +6 -0
  23. {txt2stix-1.1.8.dist-info → txt2stix-1.1.9.dist-info}/METADATA +1 -1
  24. {txt2stix-1.1.8.dist-info → txt2stix-1.1.9.dist-info}/RECORD +27 -26
  25. txt2stix/includes/lookups/mitre_atlas_name_v4_5_2.txt +0 -117
  26. txt2stix/includes/lookups/mitre_attack_enterprise_id_v16_0.txt +0 -1656
  27. txt2stix/includes/lookups/mitre_attack_enterprise_name_v16_0.txt +0 -1765
  28. txt2stix/includes/lookups/mitre_attack_ics_id_v16_0.txt +0 -254
  29. txt2stix/includes/lookups/mitre_attack_mobile_id_v16_0.txt +0 -277
  30. txt2stix/includes/lookups/mitre_attack_mobile_name_v16_0.txt +0 -296
  31. {txt2stix-1.1.8.dist-info → txt2stix-1.1.9.dist-info}/WHEEL +0 -0
  32. {txt2stix-1.1.8.dist-info → txt2stix-1.1.9.dist-info}/entry_points.txt +0 -0
  33. {txt2stix-1.1.8.dist-info → txt2stix-1.1.9.dist-info}/licenses/LICENSE +0 -0
@@ -1,560 +1,560 @@
1
- The MITRE Corporation
2
- Accessing Functionality Not Properly Constrained by ACLs
3
- Buffer Overflow via Environment Variables
4
- Overflow Buffers
5
- Server Side Include (SSI) Injection
6
- Session Sidejacking
7
- Clickjacking
8
- Cross Zone Scripting
9
- HTTP Request Splitting
10
- Cross Site Tracing
11
- Command Line Execution through SQL Injection
12
- Object Relational Mapping Injection
13
- Cause Web Server Misclassification
14
- SQL Injection through SOAP Parameter Tampering
15
- JSON Hijacking (aka JavaScript Hijacking)
16
- Brute Force
17
- Interface Manipulation
18
- Authentication Abuse
19
- Authentication Bypass
20
- Excavation
21
- Interception
22
- Choosing Message Identifier
23
- Double Encoding
24
- Exploit Non-Production Interfaces
25
- Privilege Abuse
26
- Buffer Manipulation
27
- Shared Resource Manipulation
28
- Flooding
29
- Path Traversal
30
- Directory Indexing
31
- Integer Attacks
32
- Pointer Manipulation
33
- Subverting Environment Variable Values
34
- Excessive Allocation
1
+ Forceful Browsing
2
+ Bypassing Physical Locks
3
+ Using Alternative IP Address Encodings
4
+ Malicious Software Download
5
+ Session Credential Falsification through Manipulation
6
+ Removing/short-circuiting 'Purse' logic: removing/mutating 'cash' decrements
7
+ Cross Frame Scripting (XFS)
35
8
  Resource Leak Exposure
36
- Symlink Attack
37
- Try All Common Switches
38
- Email Injection
39
- Format String Injection
40
- LDAP Injection
41
- Parameter Injection
42
- Reflection Injection
43
- Relative Path Traversal
44
- Client-side Injection-induced Buffer Overflow
45
- Bypassing of Intermediate Forms in Multiple-Form Sets
46
- Cache Poisoning
47
- DNS Cache Poisoning
48
- Detect Unpublicized Web Pages
49
- Detect Unpublicized Web Services
50
- Checksum Spoofing
51
- XML Schema Poisoning
52
- XML Ping of the Death
53
- Content Spoofing
54
- Explore for Predictable Temporary File Names
55
- Command Delimiters
56
- Collect Data from Common Resource Locations
57
- Identity Spoofing
58
- Input Data Manipulation
59
- Resource Location Spoofing
60
- Screen Temporary Files for Sensitive Information
61
- Sniffing Attacks
62
- Sniffing Network Traffic
63
- Redirect Access to Libraries
64
- Dictionary-based Password Attack
65
- Exploit Script-Based APIs
66
- Infrastructure Manipulation
67
- Manipulating Hidden Fields
68
- Spear Phishing
69
- Mobile Phishing
70
- File Manipulation
71
- Force the System to Reset Values
72
- White Box Reverse Engineering
73
- Windows ::DATA Alternate Data Stream
74
- Footprinting
75
- Using Malicious Files
9
+ Malicious Software Implanted
10
+ Credential Stuffing
11
+ Use of Captured Hashes (Pass The Hash)
12
+ Use of Captured Tickets (Pass The Ticket)
13
+ Target Influence via Instant Rapport
14
+ Remote Services with Stolen Credentials
15
+ UDP Scan
16
+ Using Escaped Slashes in Alternate Encoding
17
+ Manipulating Writeable Configuration Files
18
+ Cross Site Request Forgery
19
+ Disabling Network Hardware
20
+ Transaction or Event Tampering via Application API Manipulation
21
+ Web Server Logs Tampering
22
+ Exploitation of Firmware or ROM Code with Unpatchable Vulnerabilities
76
23
  Web Application Fingerprinting
77
- Action Spoofing
78
- Flash Parameter Injection
79
- Code Inclusion
80
- Configuration/Environment Manipulation
81
- Create files with the same name as files protected with a higher classification
82
- Cross-Site Flashing
83
- Calling Micro-Services Directly
84
- XSS Targeting Non-Script Elements
85
- Exploiting Incorrectly Configured Access Control Security Levels
86
- Flash File Overlay
87
- Flash Injection
88
- IMAP/SMTP Command Injection
89
- Software Integrity Attack
90
- Malicious Software Download
91
- Malicious Software Update
92
- Malicious Automated Software Update via Redirection
93
- Reverse Engineering
94
- Black Box Reverse Engineering
95
- Embedding Scripts within Scripts
96
- Reverse Engineer an Executable to Expose Assumed Hidden Functionality
97
- Read Sensitive Constants Within an Executable
98
- Protocol Analysis
99
- PHP Remote File Inclusion
100
- Fake the Source of Data
101
- Principal Spoof
102
- Session Credential Falsification through Forging
103
- Exponential Data Expansion
24
+ Counterfeit Websites
25
+ Windows ::DATA Alternate Data Stream
104
26
  XSS Targeting Error Pages
105
- XSS Using Alternate Syntax
106
- Inducing Account Lockout
107
- Encryption Brute Forcing
108
- Removal of filters: Input filters, output filters, data masking
109
- Serialized Data External Linking
27
+ Metadata Spoofing
28
+ Smudge Attack
29
+ ICMP Error Message Quoting Probe
30
+ Android Activity Hijack
31
+ WiFi SSID Tracking
32
+ TCP (ISN) Sequence Predictability Probe
33
+ Resource Injection
34
+ Modification During Manufacture
35
+ Creating a Rogue Certification Authority Certificate
36
+ Malicious Logic Insertion
37
+ HTTP Verb Tampering
38
+ Modify Existing Service
39
+ Collect Data from Screen Capture
40
+ Software Development Tools Maliciously Altered
41
+ Force the System to Reset Values
110
42
  Create Malicious Client
111
- Manipulate Registry Information
112
- Lifting Sensitive Data Embedded in Cache
113
- Signing Malicious Code
114
- Removing Important Client Functionality
115
- Removing/short-circuiting 'Purse' logic: removing/mutating 'cash' decrements
116
- XSS Using MIME Type Mismatch
117
- Exploitation of Trusted Identifiers
118
- Functionality Misuse
119
- Fuzzing for application mapping
120
- Communication Channel Manipulation
43
+ Replace Binaries
44
+ WSDL Scanning
45
+ TCP Xmas Scan
46
+ TCP Flood
47
+ Cellular Jamming
48
+ Calling Micro-Services Directly
49
+ Data Interchange Protocol Manipulation
50
+ Influence Perception of Reciprocation
51
+ Cloning Magnetic Strip Cards
52
+ Pull Data from System Resources
53
+ Task Impersonation
54
+ Absolute Path Traversal
55
+ Exploitation of Improperly Controlled Registers
56
+ Probe iOS Screenshots
57
+ Web Services API Signature Forgery Leveraging Hash Function Extension Weakness
121
58
  Exploiting Incorrectly Configured SSL/TLS
122
- Spoofing of UDDI/ebXML Messages
123
- XML Routing Detour Attacks
124
- Exploiting Trust in Client
125
- Client-Server Protocol Manipulation
126
- Data Serialization External Entities Blowup
127
- iFrame Overlay
128
- Fingerprinting
129
- Session Credential Falsification through Manipulation
130
- Sustained Client Engagement
131
- DTD Injection
132
- Serialized Data Parameter Blowup
133
- File Content Injection
134
- Serialized Data with Nested Payloads
135
- Oversized Serialized Data Payloads
136
- Privilege Escalation
137
- Hijacking a privileged process
59
+ StarJacking
60
+ Hijacking a Privileged Thread of Execution
138
61
  Escaping a Sandbox by Calling Code in Another Language
139
- Filter Failure through Buffer Overflow
140
- Resource Injection
141
- Code Injection
142
- XSS Targeting HTML Attributes
143
- XSS Targeting URI Placeholders
144
- XSS Using Doubled Characters
145
- XSS Using Invalid Characters
146
- Command Injection
147
- Forced Deadlock
148
- XML Injection
149
- Local Code Inclusion
150
- PHP Local File Inclusion
151
- Remote Code Inclusion
152
- SOAP Array Overflow
153
- Leveraging Race Conditions
154
- Fuzzing for garnering other adjacent user/sensitive data
155
- Force Use of Corrupted Files
156
- Leverage Alternate Encoding
157
- Audit Log Manipulation
158
- Leveraging Race Conditions via Symbolic Links
159
- Modification of Registry Run Keys
160
- Schema Poisoning
62
+ TCP Congestion Control Flag (ECN) Probe
63
+ Log Injection-Tampering-Forging
64
+ Analysis of Packet Timing and Sizes
65
+ Integer Attacks
66
+ Exploiting Trust in Client
67
+ Flash File Overlay
68
+ Malicious Code Implanted During Chip Programming
161
69
  Protocol Manipulation
162
- HTTP Response Smuggling
163
- HTTP Verb Tampering
164
- DNS Rebinding
165
- Inter-component Protocol Manipulation
166
- Data Interchange Protocol Manipulation
167
- Web Services Protocol Manipulation
168
- SOAP Manipulation
169
- Fuzzing
170
- ICMP Echo Request Ping
171
- TCP SYN Scan
172
- Leveraging Time-of-Check and Time-of-Use (TOCTOU) Race Conditions
173
- Enumerate Mail Exchange (MX) Records
174
- DNS Zone Transfers
175
- Host Discovery
176
- Traceroute Route Enumeration
177
- ICMP Address Mask Request
70
+ Read Sensitive Constants Within an Executable
71
+ Identity Spoofing
72
+ Reflection Attack in Authentication Protocol
73
+ System Footprinting
74
+ Exploitation of Trusted Identifiers
75
+ Oversized Serialized Data Payloads
76
+ Reverse Engineering
178
77
  Timestamp Request
179
- ICMP Information Request
180
- TCP ACK Ping
181
- UDP Ping
182
- TCP SYN Ping
183
- Using Leading 'Ghost' Character Sequences to Bypass Input Filters
184
- Hijacking a Privileged Thread of Execution
185
- Port Scanning
186
- TCP Connect Scan
187
- TCP FIN Scan
188
- TCP Xmas Scan
189
- TCP Null Scan
190
- TCP ACK Scan
191
- TCP Window Scan
192
- TCP RPC Scan
193
- UDP Scan
194
- Network Topology Mapping
195
- Accessing/Intercepting/Modifying HTTP Cookies
196
- Scanning for Vulnerable Software
197
- Active OS Fingerprinting
198
- Passive OS Fingerprinting
199
- IP ID Sequencing Probe
200
- IP 'ID' Echoed Byte-Order Probe
201
- IP (DF) 'Don't Fragment Bit' Echoing Probe
78
+ Install Malicious Extension
79
+ Use of Known Operating System Credentials
80
+ Local Code Inclusion
202
81
  XSS Through HTTP Query Strings
203
- TCP Timestamp Probe
204
- TCP Sequence Number Probe
82
+ Eavesdropping on a Monitor
83
+ System Location Discovery
84
+ Browser Fingerprinting
85
+ Infrastructure Manipulation
86
+ Flash Injection
87
+ Harvesting Information via API Event Monitoring
88
+ Transparent Proxy Abuse
89
+ Subvert Code-signing Facilities
205
90
  TCP (ISN) Greatest Common Divisor Probe
206
- TCP (ISN) Counter Rate Probe
207
- TCP (ISN) Sequence Predictability Probe
208
- TCP Congestion Control Flag (ECN) Probe
209
- TCP Initial Window Size Probe
210
- TCP Options Probe
91
+ Local Execution of Code
92
+ Pretexting via Customer Service
211
93
  TCP 'RST' Flag Checksum Probe
212
- ICMP Error Message Quoting Probe
213
- HTTP Request Smuggling
214
- ICMP Error Message Echoing Integrity Probe
215
- ICMP IP Total Length Field Probe
216
- ICMP IP 'ID' Field Error Message Probe
217
- HTTP Response Splitting
218
- Leverage Executable Code in Non-Executable Files
219
- Using Unpublished Interfaces or Functionality
220
- Retrieve Embedded Sensitive Data
94
+ ICMP Flood
95
+ Counterfeit GPS Signals
96
+ Authentication Abuse
221
97
  Leveraging/Manipulating Configuration File Search Paths
222
- Harvesting Information via API Event Monitoring
223
- Application API Message Manipulation via Man-in-the-Middle
224
- Transaction or Event Tampering via Application API Manipulation
225
- Application API Navigation Remapping
226
- Navigation Remapping To Propagate Malicious Content
227
- Application API Button Hijacking
228
- Content Spoofing Via Application API Manipulation
229
- Manipulating Opaque Client-based Data Tokens
230
- Bypassing Physical Security
231
- Bypassing Physical Locks
232
- Lock Bumping
233
- Lock Picking
234
- Using a Snap Gun Lock to Force a Lock
235
- Bypassing Electronic Locks and Access Controls
236
- Cloning Magnetic Strip Cards
237
- Magnetic Strip Card Brute Force Attacks
238
- Cloning RFID Cards or Chips
239
- Using Alternative IP Address Encodings
240
- Manipulating Writeable Terminal Devices
241
- RFID Chip Deactivation or Destruction
242
- Physically Hacking Hardware
243
- Bypassing ATA Password Security
244
- Dumpster Diving
245
- Pretexting
98
+ Using UTF-8 Encoding to Bypass Validation Logic
99
+ Command Injection
246
100
  Using Meta-characters in E-mail Headers to Inject Malicious Payloads
247
- Information Elicitation
248
- Pretexting via Customer Service
249
- Pretexting via Tech Support
250
- Pretexting via Delivery Person
251
- Pretexting via Phone
252
- Manipulate Human Behavior
253
- Influence Perception
254
- Influence Perception of Reciprocation
255
- MIME Conversion
256
- Influence Perception of Scarcity
257
- Influence Perception of Authority
258
- Influence Perception of Commitment and Consistency
259
- Influence Perception of Liking
260
- Influence Perception of Consensus or Social Proof
261
- Target Influence via Framing
101
+ RFID Chip Deactivation or Destruction
102
+ Protocol Analysis
103
+ Hardware Component Substitution During Baselining
104
+ Sniff Application Code
105
+ IP ID Sequencing Probe
106
+ Artificially Inflate File Sizes
107
+ File Discovery
108
+ Manipulating Writeable Terminal Devices
109
+ Content Spoofing Via Application API Manipulation
262
110
  Influence via Incentives
263
- Influence via Psychological Principles
264
- Influence via Modes of Thinking
265
- Target Influence via Eye Cues
266
- Exploiting Multiple Input Interpretation Layers
267
- Target Influence via The Human Buffer Overflow
268
- Target Influence via Interview and Interrogation
269
- Target Influence via Instant Rapport
270
- Modification During Manufacture
271
- Manipulation During Distribution
272
- Overflow Binary Resource File
273
- Hardware Integrity Attack
274
- Malicious Logic Insertion
275
- Infected Software
276
- Malicious Logic Inserted Into Product by Authorized Developer
277
- Development Alteration
278
- Malicious Logic Insertion into Product Software via Configuration Management Manipulation
111
+ Browser in the Middle (BiTM)
112
+ Utilizing REST's Trust in the System Resource to Obtain Sensitive Data
113
+ Expanding Control over the Operating System from the Database
114
+ Forced Integer Overflow
115
+ Forced Deadlock
116
+ Manipulating Web Input to File System Calls
279
117
  Malicious Logic Insertion into Product via Inclusion of Third-Party Component
280
- Design Alteration
118
+ TCP Window Scan
119
+ Adversary in the Middle (AiTM)
120
+ XSS Through HTTP Headers
121
+ WebView Injection
122
+ Cellular Broadcast Message Request
123
+ Carry-Off GPS Attack
124
+ Exploitation of Improperly Configured or Implemented Memory Protections
125
+ MIME Conversion
126
+ Documentation Alteration to Cause Errors in System Design
127
+ Removing Important Client Functionality
128
+ Signing Malicious Code
129
+ Malicious Software Update
130
+ DNS Domain Seizure
131
+ Compromising Emanations Attack
132
+ Leveraging Time-of-Check and Time-of-Use (TOCTOU) Race Conditions
133
+ Owner Footprinting
134
+ Email Injection
135
+ TCP ACK Scan
136
+ Lock Bumping
137
+ Overread Buffers
138
+ Session Credential Falsification through Forging
281
139
  Embed Virus into DLL
282
- Buffer Overflow via Symbolic Links
283
- Infected Hardware
284
- Infected Memory
285
- USB Memory Attacks
286
- Flash Memory Attacks
287
- Creating a Rogue Certification Authority Certificate
288
- Overflow Variables and Tags
289
- HTTP Parameter Pollution (HPP)
290
- Web Services API Signature Forgery Leveraging Hash Function Extension Weakness
291
- Cross-Domain Search Timing
292
- Padding Oracle Crypto Attack
293
- Evercookie
294
- Transparent Proxy Abuse
295
- Leveraging Active Adversary in the Middle Attacks to Bypass Same Origin Policy
296
- Cross Site Identification
297
- Generic Cross-Browser Cross-Domain Theft
298
- HTTP DoS
299
- Buffer Overflow via Parameter Expansion
300
- Expanding Control over the Operating System from the Database
301
- Search Order Hijacking
302
- Browser Fingerprinting
303
- Signature Spoof
304
- Signature Spoofing by Key Theft
305
- Signature Spoofing by Improper Validation
306
- Signature Spoofing by Misrepresentation
307
- Signature Spoofing by Mixing Signed and Unsigned Content
308
- Modification of Windows Service Configuration
309
- Malicious Root Certificate
310
- Passing Local Filenames to Functions That Expect a URL
311
- Escaping Virtualization
312
- Contradictory Destinations in Traffic Routing Schemes
313
- TCP Flood
314
- Signature Spoofing by Key Recreation
315
- UDP Flood
316
- ICMP Flood
317
- HTTP Flood
318
- SSL Flood
319
- Password Brute Forcing
320
- Amplification
321
- Quadratic Data Expansion
322
- Regular Expression Exponential Blowup
323
- SOAP Array Blowup
324
- TCP Fragmentation
140
+ Schema Poisoning
141
+ ICMP Error Message Echoing Integrity Probe
325
142
  UDP Fragmentation
326
- ICMP Fragmentation
327
- File Discovery
328
- Probe iOS Screenshots
143
+ SQL Injection
144
+ Malicious Logic Inserted Into Product by Authorized Developer
145
+ Exploitation of Thunderbolt Protection Flaws
146
+ Navigation Remapping To Propagate Malicious Content
147
+ Weakening of Cellular Encryption
148
+ TCP FIN Scan
149
+ Contradictory Destinations in Traffic Routing Schemes
150
+ ICMP Information Request
151
+ Physical Destruction of Device or Component
152
+ Buffer Manipulation
153
+ Targeted Malware
154
+ Mobile Device Fault Injection
329
155
  Android Intent Intercept
330
- Blue Boxing
331
- Password Recovery Exploitation
332
- WebView Injection
333
- Android Activity Hijack
334
- Intent Spoof
335
- WebView Exposure
336
- Task Impersonation
337
- Scheme Squatting
338
- Tapjacking
339
- Physical Theft
340
- Shoulder Surfing
341
- Kerberoasting
342
- Poison Web Service Registry
156
+ Influence Perception of Scarcity
157
+ Pretexting via Phone
158
+ Query System for Information
159
+ TCP ACK Ping
160
+ Buffer Overflow via Environment Variables
161
+ Escaping Virtualization
162
+ TCP (ISN) Counter Rate Probe
163
+ LDAP Injection
164
+ SOAP Array Overflow
165
+ Black Box Reverse Engineering
166
+ String Format Overflow in syslog()
167
+ Cross-Site Flashing
168
+ Infected Hardware
169
+ Server Side Include (SSI) Injection
170
+ Inducing Account Lockout
171
+ ICMP Address Mask Request
172
+ Code Inclusion
173
+ PHP Remote File Inclusion
174
+ Altered Installed BIOS
175
+ Collect Data as Provided by Users
176
+ File Content Injection
177
+ Terrestrial Jamming
178
+ XSS Using Invalid Characters
179
+ Malicious Hardware Component Replacement
180
+ Adversary in the Browser (AiTB)
181
+ Retrieve Embedded Sensitive Data
343
182
  SaaS User Request Forgery
344
- Infiltration of Software Development Environment
345
- Hardware Component Substitution During Baselining
346
- Documentation Alteration to Circumvent Dial-down
347
- Documentation Alteration to Produce Under-performing Systems
348
- Documentation Alteration to Cause Errors in System Design
349
- Embedding NULL Bytes
350
- Counterfeit Hardware Component Inserted During Product Assembly
183
+ Obstruction
184
+ Influence Perception of Liking
351
185
  Hardware Design Specifications Are Altered
352
- Malicious Hardware Component Replacement
353
- Malicious Software Implanted
354
- Rogue Integration Procedures
355
- XML Flood
356
- Malware-Directed Internal Reconnaissance
357
- Postfix, Null Terminate, and Backslash
358
- Provide Counterfeit Component
359
- Hardware Component Substitution
360
- Altered Installed BIOS
361
- Malicious Manual Software Update
362
- Malicious Hardware Update
363
- Malicious Gray Market Hardware
364
- Data Injected During Configuration
365
- Infiltration of Hardware Development Environment
366
- Open-Source Library Manipulation
367
- ASIC With Malicious Functionality
368
- Query System for Information
369
- Overread Buffers
370
- Application Fingerprinting
371
- Targeted Malware
372
- Counterfeit Websites
373
- Counterfeit Organizations
374
- Pull Data from System Resources
375
- Incomplete Data Deletion in a Multi-Tenant Environment
376
- Physical Destruction of Device or Component
186
+ Generic Cross-Browser Cross-Domain Theft
187
+ Command Delimiters
188
+ Software Integrity Attack
189
+ Cross-Domain Search Timing
190
+ Manipulation During Distribution
191
+ DNS Blocking
192
+ Remote Code Inclusion
193
+ Requirements for ASIC Functionality Maliciously Altered
194
+ Signature Spoofing by Key Recreation
195
+ JSON Hijacking (aka JavaScript Hijacking)
196
+ Removal of filters: Input filters, output filters, data masking
197
+ IP Address Blocking
198
+ Information Elicitation
199
+ DTD Injection
200
+ Buffer Overflow via Symbolic Links
201
+ Pharming
202
+ Pretexting via Tech Support
203
+ Manipulating User-Controlled Variables
204
+ Object Injection
205
+ Bypassing Electronic Locks and Access Controls
206
+ Documentation Alteration to Produce Under-performing Systems
207
+ Infiltration of Software Development Environment
208
+ Collect Data from Clipboard
209
+ Mobile Phishing
377
210
  Contaminate Resource
378
- Local Execution of Code
379
- Rainbow Table Password Cracking
380
- Install New Service
381
- Modify Existing Service
382
- Install Rootkit
383
- Functionality Bypass
384
- Remote Services with Stolen Credentials
385
- Replace File Extension Handlers
386
- Replace Trusted Executable
387
- Orbital Jamming
388
- Use of Known Domain Credentials
389
- Windows Admin Shares with Stolen Credentials
390
- Modify Shared File
391
- Add Malicious File to Shared Webroot
392
- Run Software at Logon
393
- Password Spraying
394
- Capture Credentials via Keylogger
395
- Collect Data as Provided by Users
396
- Utilizing REST's Trust in the System Resource to Obtain Sensitive Data
397
- Block Logging to Central Repository
398
- Artificially Inflate File Sizes
399
- Process Footprinting
211
+ Reflected XSS
212
+ Active OS Fingerprinting
213
+ Pointer Manipulation
214
+ Influence via Modes of Thinking
215
+ Directory Indexing
216
+ Padding Oracle Crypto Attack
217
+ Embedding Scripts within Scripts
218
+ Session Hijacking
219
+ Manipulating State
220
+ Create files with the same name as files protected with a higher classification
221
+ Magnetic Strip Card Brute Force Attacks
222
+ Peripheral Footprinting
223
+ XQuery Injection
224
+ Infected Software
225
+ Using Unicode Encoding to Bypass Validation Logic
226
+ XSS Using Doubled Characters
227
+ Flooding
228
+ Alteration of a Software Update
229
+ Traffic Injection
230
+ Session Sidejacking
231
+ Bypassing ATA Password Security
400
232
  Services Footprinting
233
+ TCP RPC Scan
234
+ Target Influence via The Human Buffer Overflow
401
235
  Account Footprinting
402
- Group Permission Footprinting
403
- Owner Footprinting
404
- Disable Security Software
405
- Replace Winlogon Helper DLL
236
+ Sustained Client Engagement
237
+ Spoof Open-Source Software Metadata
238
+ Malware-Directed Internal Reconnaissance
239
+ Cross-Site Scripting (XSS)
240
+ HTTP Parameter Pollution (HPP)
241
+ Input Data Manipulation
242
+ Signature Spoofing by Misrepresentation
243
+ Cause Web Server Misclassification
406
244
  Restful Privilege Elevation
407
- System Footprinting
408
- Security Software Footprinting
245
+ Bypassing of Intermediate Forms in Multiple-Form Sets
246
+ Jamming
247
+ TCP Fragmentation
248
+ Use of Known Kerberos Credentials
249
+ Dumpster Diving
250
+ Fingerprinting
251
+ Overflow Buffers
252
+ Install Rootkit
253
+ Tapjacking
409
254
  Route Disabling
410
- Disabling Network Hardware
411
- BGP Route Disabling
412
- DNS Domain Seizure
413
- Object Injection
414
- Cross Frame Scripting (XFS)
415
- DOM-Based XSS
416
- DNS Blocking
255
+ Leveraging Active Adversary in the Middle Attacks to Bypass Same Origin Policy
256
+ Collect Data from Common Resource Locations
257
+ Orbital Jamming
258
+ Brute Force
259
+ Blue Boxing
260
+ SQL Injection through SOAP Parameter Tampering
261
+ Symlink Attack
262
+ Embedding NULL Bytes
263
+ Pretexting via Delivery Person
417
264
  Session Credential Falsification through Prediction
418
- IP Address Blocking
419
- Reflected XSS
265
+ Fuzzing
266
+ Code Injection
267
+ Hiding Malicious Data or Code within Files
268
+ Infiltration of Hardware Development Environment
269
+ Hardware Integrity Attack
270
+ Screen Temporary Files for Sensitive Information
420
271
  Stored XSS
421
- Session Hijacking
422
- Traffic Injection
423
- Connection Reset
424
- TCP RST Injection
425
- Absolute Path Traversal
426
- DNS Spoofing
427
- Terrestrial Jamming
428
- Argument Injection
429
- Reusing Session IDs (aka Session Replay)
430
- Credential Stuffing
431
- Jamming
432
- Blockage
433
- Wi-Fi Jamming
434
- Cellular Jamming
435
- Weakening of Cellular Encryption
436
- Obstruction
437
- Cryptanalysis of Cellular Encryption
438
- Cellular Traffic Intercept
439
- Session Fixation
440
- Cellular Data Injection
441
- BitSquatting
442
- WiFi MAC Address Tracking
443
- WiFi SSID Tracking
444
- Rooting SIM Cards
445
- Evil Twin Wi-Fi Attack
446
- Establish Rogue Location
447
- Cellular Rogue Base Station
448
- Cellular Broadcast Message Request
449
- Signal Strength Tracking
450
- Cross Site Request Forgery
451
- Drop Encryption Level
452
- Analysis of Packet Timing and Sizes
272
+ Add Malicious File to Shared Webroot
273
+ Root/Jailbreak Detection Evasion via Debugging
274
+ Block Access to Libraries
275
+ UDP Ping
276
+ Malicious Automated Software Update via Redirection
277
+ Malicious Manual Software Update
278
+ Passing Local Filenames to Functions That Expect a URL
279
+ Communication Channel Manipulation
280
+ Fake the Source of Data
281
+ Encryption Brute Forcing
282
+ Principal Spoof
283
+ Reverse Engineer an Executable to Expose Assumed Hidden Functionality
284
+ Footprinting
285
+ Use of Known Domain Credentials
286
+ DNS Zone Transfers
287
+ XSS Targeting Non-Script Elements
288
+ Sniffing Network Traffic
289
+ Command Line Execution through SQL Injection
290
+ Target Influence via Framing
453
291
  Electromagnetic Side-Channel Attack
454
- Compromising Emanations Attack
292
+ Serialized Data with Nested Payloads
293
+ Pretexting
294
+ Scanning for Vulnerable Software
295
+ Bypassing Physical Security
296
+ Inclusion of Code in Existing Process
297
+ Flash Parameter Injection
298
+ Try Common or Default Usernames and Passwords
299
+ Key Negotiation of Bluetooth Attack (KNOB)
300
+ Password Brute Forcing
301
+ SOAP Manipulation
302
+ Overflow Variables and Tags
303
+ Documentation Alteration to Circumvent Dial-down
304
+ Authentication Bypass
305
+ Quadratic Data Expansion
306
+ Block Logging to Central Repository
307
+ Blind SQL Injection
308
+ Excavation
309
+ Kerberoasting
310
+ Signature Spoofing by Improper Validation
311
+ Signature Spoofing by Mixing Signed and Unsigned Content
312
+ Accessing Functionality Not Properly Constrained by ACLs
313
+ Altered Component Firmware
314
+ Modification of Windows Service Configuration
315
+ Traceroute Route Enumeration
316
+ AJAX Footprinting
317
+ XML Ping of the Death
318
+ Poison Web Service Registry
319
+ Eavesdropping
320
+ Alternative Execution Due to Deceptive Filenames
455
321
  Hardware Fault Injection
456
- Mobile Device Fault Injection
457
- Smudge Attack
458
- Counterfeit GPS Signals
459
- Carry-Off GPS Attack
460
- Cross-Site Scripting (XSS)
322
+ TCP Null Scan
323
+ Flash Memory Attacks
324
+ Replace Winlogon Helper DLL
325
+ Counterfeit Organizations
326
+ Lock Picking
327
+ Probe System Files
328
+ Leverage Executable Code in Non-Executable Files
329
+ Using Malicious Files
330
+ Manipulating Opaque Client-based Data Tokens
331
+ XML Routing Detour Attacks
332
+ Malicious Automated Software Update via Spoofing
333
+ Application API Button Hijacking
334
+ ICMP Echo Request Ping
335
+ Client-Server Protocol Manipulation
336
+ Port Scanning
337
+ Modify Shared File
338
+ Identify Shared Files/Directories on System
339
+ NoSQL Injection
340
+ Checksum Spoofing
341
+ Cryptanalysis of Cellular Encryption
342
+ Application API Navigation Remapping
343
+ Influence via Psychological Principles
344
+ Hijacking a privileged process
345
+ Phishing
346
+ Try All Common Switches
347
+ Reusing Session IDs (aka Session Replay)
348
+ TCP Timestamp Probe
349
+ Leverage Alternate Encoding
350
+ Detect Unpublicized Web Pages
351
+ Counterfeit Hardware Component Inserted During Product Assembly
352
+ SoundSquatting
353
+ Disable Security Software
354
+ Malicious Root Certificate
355
+ Rainbow Table Password Cracking
356
+ Inter-component Protocol Manipulation
357
+ Shoulder Surfing
358
+ Manipulating Hidden Fields
359
+ USB Memory Attacks
360
+ BitSquatting
361
+ Developer Signing Maliciously Altered Software
362
+ Malicious Hardware Update
363
+ DNS Rebinding
364
+ Probe Audio and Video Peripherals
365
+ Retrieve Data from Decommissioned Devices
366
+ Exploiting Incorrect Chaining or Granularity of Hardware Debug Components
367
+ Signature Spoofing by Key Theft
368
+ Dictionary-based Password Attack
369
+ XML Injection
370
+ HTTP DoS
371
+ Exploiting Incorrectly Configured Access Control Security Levels
372
+ Postfix, Null Terminate, and Backslash
373
+ Search Order Hijacking
374
+ Collect Data from Registries
375
+ XML Flood
376
+ Password Recovery Exploitation
377
+ HTTP Response Smuggling
378
+ Using a Snap Gun Lock to Force a Lock
379
+ Install New Service
380
+ Influence Perception
381
+ Detect Unpublicized Web Services
382
+ DOM-Based XSS
383
+ Provide Counterfeit Component
384
+ XSS Using MIME Type Mismatch
385
+ Exploit Non-Production Interfaces
386
+ Relative Path Traversal
387
+ Intent Spoof
388
+ Audit Log Manipulation
389
+ Fuzzing for application mapping
390
+ Process Footprinting
391
+ Cellular Data Injection
392
+ Run Software at Logon
393
+ Buffer Overflow in Local Command-Line Utilities
461
394
  TypoSquatting
462
- SoundSquatting
463
- Homograph Attack via Homoglyphs
395
+ Web Services Protocol Manipulation
396
+ XSS Using Alternate Syntax
397
+ HTTP Request Splitting
398
+ iFrame Overlay
399
+ Rooting SIM Cards
400
+ Argument Injection
401
+ Upload a Web Shell to a Web Server
402
+ HTTP Response Splitting
403
+ Wi-Fi Jamming
404
+ UDP Flood
405
+ Target Influence via Eye Cues
406
+ Evil Twin Wi-Fi Attack
407
+ Force Use of Corrupted Files
408
+ Content Spoofing
409
+ TCP SYN Ping
410
+ Interception
411
+ Sniffing Attacks
412
+ Explore for Predictable Temporary File Names
413
+ Data Injected During Configuration
464
414
  Token Impersonation
465
- Probe Audio and Video Peripherals
466
- Alternative Execution Due to Deceptive Filenames
467
- Hiding Malicious Data or Code within Files
468
- Collect Data from Clipboard
469
- Altered Component Firmware
470
- Probe System Files
471
- Using Slashes and URL Encoding Combined to Bypass Validation Logic
472
- Inclusion of Code in Existing Process
473
415
  DLL Side-Loading
474
- Replace Binaries
475
- Identify Shared Files/Directories on System
476
- Use of Captured Hashes (Pass The Hash)
477
- Use of Captured Tickets (Pass The Ticket)
478
- Peripheral Footprinting
479
- Collect Data from Registries
480
- Collect Data from Screen Capture
481
- Adding a Space to a File Extension
482
- Sniff Application Code
483
- Upload a Web Shell to a Web Server
484
- Eavesdropping
485
- Use of Known Kerberos Credentials
486
- Use of Known Operating System Credentials
487
- Credential Prompt Impersonation
416
+ ASIC With Malicious Functionality
417
+ OS Command Injection
418
+ SOAP Array Blowup
419
+ Privilege Escalation
420
+ TCP Options Probe
421
+ WebView Exposure
422
+ Session Fixation
423
+ Target Influence via Interview and Interrogation
424
+ Lifting Sensitive Data Embedded in Cache
425
+ BlueSmacking
426
+ Client-side Injection-induced Buffer Overflow
427
+ TCP Initial Window Size Probe
428
+ Homograph Attack via Homoglyphs
429
+ Cross Site Identification
430
+ Leveraging Race Conditions
431
+ Functionality Misuse
432
+ XSS Targeting URI Placeholders
433
+ Cellular Traffic Intercept
434
+ Modification of Registry Run Keys
435
+ Network Boundary Bridging
436
+ Security Software Footprinting
437
+ DHCP Spoofing
438
+ Cloning RFID Cards or Chips
439
+ Open-Source Library Manipulation
440
+ Target Programs with Elevated Privileges
441
+ Format String Injection
488
442
  Avoid Security Tool Identification by Adding Data
443
+ Replace File Extension Handlers
444
+ TCP Sequence Number Probe
445
+ Malicious Gray Market Hardware
446
+ Accessing/Intercepting/Modifying HTTP Cookies
447
+ Parameter Injection
448
+ Fuzzing for garnering other adjacent user/sensitive data
449
+ Resource Location Spoofing
450
+ Design Alteration
451
+ System Build Data Maliciously Altered
452
+ IP (DF) 'Don't Fragment Bit' Echoing Probe
453
+ Using Unpublished Interfaces or Functionality
454
+ Redirect Access to Libraries
455
+ White Box Reverse Engineering
456
+ Overflow Binary Resource File
457
+ HTTP Flood
458
+ WiFi MAC Address Tracking
459
+ PHP Local File Inclusion
460
+ Filter Failure through Buffer Overflow
461
+ Shared Resource Manipulation
462
+ Host Discovery
463
+ HTTP Request Smuggling
464
+ URL Encoding
465
+ Influence Perception of Consensus or Social Proof
466
+ Signal Strength Tracking
467
+ Replace Trusted Executable
468
+ Signature Spoof
469
+ ICMP IP Total Length Field Probe
470
+ Serialized Data External Linking
471
+ Choosing Message Identifier
472
+ Serialized Data Parameter Blowup
473
+ Using Leading 'Ghost' Character Sequences to Bypass Input Filters
474
+ Infected Memory
475
+ Regular Expression Exponential Blowup
476
+ Physical Theft
477
+ TCP RST Injection
478
+ ICMP IP 'ID' Field Error Message Probe
479
+ Excessive Allocation
480
+ Cache Poisoning
481
+ Manipulate Registry Information
482
+ Reflection Injection
483
+ Repo Jacking
484
+ Buffer Overflow via Parameter Expansion
485
+ Buffer Overflow in an API Call
486
+ Drop Encryption Level
487
+ Amplification
488
+ Enumerate Mail Exchange (MX) Records
489
+ Spoof Version Control System Commit Metadata
490
+ Connection Reset
491
+ Spoofing of UDDI/ebXML Messages
492
+ Application Fingerprinting
493
+ Exploiting Multiple Input Interpretation Layers
494
+ Exploitation of Improperly Controlled Hardware Security Identifiers
495
+ Establish Rogue Location
496
+ Application API Message Manipulation via Man-in-the-Middle
497
+ Server Motherboard Compromise
498
+ XSS Targeting HTML Attributes
499
+ BGP Route Disabling
500
+ Using Slashes in Alternate Encoding
501
+ XML Schema Poisoning
502
+ Cross Zone Scripting
489
503
  Voice Phishing
490
- Malicious Automated Software Update via Spoofing
491
- SQL Injection
492
- Root/Jailbreak Detection Evasion via Hooking
493
- Root/Jailbreak Detection Evasion via Debugging
494
- Adversary in the Browser (AiTB)
504
+ Blockage
505
+ Functionality Bypass
506
+ Clickjacking
507
+ Incomplete Data Deletion in a Multi-Tenant Environment
508
+ Evercookie
509
+ DNS Spoofing
510
+ Data Serialization External Entities Blowup
511
+ DNS Cache Poisoning
512
+ Manipulate Human Behavior
513
+ Scheme Squatting
514
+ Influence Perception of Commitment and Consistency
515
+ TCP SYN Scan
516
+ Development Alteration
495
517
  Exploitation of Transient Instruction Execution
518
+ Influence Perception of Authority
519
+ TCP Connect Scan
520
+ Object Relational Mapping Injection
521
+ Cryptanalysis
522
+ Cross Site Tracing
523
+ User-Controlled Filename
524
+ Rogue Integration Procedures
525
+ Adding a Space to a File Extension
526
+ Subverting Environment Variable Values
496
527
  Server Side Request Forgery
497
- Exploitation of Thunderbolt Protection Flaws
498
- BlueSmacking
528
+ Windows Admin Shares with Stolen Credentials
529
+ IMAP/SMTP Command Injection
530
+ SSL Flood
531
+ IP 'ID' Echoed Byte-Order Probe
532
+ Exponential Data Expansion
533
+ Passive OS Fingerprinting
534
+ Interface Manipulation
535
+ XPath Injection
536
+ Password Spraying
537
+ Credential Prompt Impersonation
538
+ Malicious Logic Insertion into Product Software via Configuration Management Manipulation
539
+ File Manipulation
540
+ Exploit Script-Based APIs
541
+ Group Permission Footprinting
542
+ Configuration/Environment Manipulation
543
+ Root/Jailbreak Detection Evasion via Hooking
544
+ Load Value Injection
545
+ Capture Credentials via Keylogger
546
+ Path Traversal
547
+ Double Encoding
548
+ ICMP Fragmentation
549
+ Action Spoofing
499
550
  Bluetooth Impersonation AttackS (BIAS)
500
- Key Negotiation of Bluetooth Attack (KNOB)
501
- Alteration of a Software Update
502
- String Format Overflow in syslog()
503
- Software Development Tools Maliciously Altered
504
- Requirements for ASIC Functionality Maliciously Altered
505
- Malicious Code Implanted During Chip Programming
506
- Developer Signing Maliciously Altered Software
507
551
  Design for FPGA Maliciously Altered
508
- Retrieve Data from Decommissioned Devices
509
- NoSQL Injection
510
- Server Motherboard Compromise
511
- System Build Data Maliciously Altered
512
- Exploitation of Improperly Configured or Implemented Memory Protections
513
- Subvert Code-signing Facilities
514
- Exploitation of Improperly Controlled Registers
515
- Exploitation of Improperly Controlled Hardware Security Identifiers
516
- Exploitation of Firmware or ROM Code with Unpatchable Vulnerabilities
517
- Target Programs with Elevated Privileges
518
- Metadata Spoofing
519
- Spoof Open-Source Software Metadata
520
- Spoof Version Control System Commit Metadata
521
- StarJacking
522
- System Location Discovery
523
- Repo Jacking
524
- Load Value Injection
525
- DHCP Spoofing
526
- Install Malicious Extension
527
- Eavesdropping on a Monitor
528
- Blind SQL Injection
529
- Try Common or Default Usernames and Passwords
530
- Network Boundary Bridging
531
- Browser in the Middle (BiTM)
532
- Exploiting Incorrect Chaining or Granularity of Hardware Debug Components
533
- Using Unicode Encoding to Bypass Validation Logic
534
- URL Encoding
535
- User-Controlled Filename
536
- Manipulating State
537
- Manipulating Writeable Configuration Files
538
- Manipulating Web Input to File System Calls
539
- Manipulating User-Controlled Variables
540
- Using Escaped Slashes in Alternate Encoding
541
- Using Slashes in Alternate Encoding
542
- Buffer Overflow in an API Call
543
- Using UTF-8 Encoding to Bypass Validation Logic
544
- Web Server Logs Tampering
545
- XPath Injection
546
- XQuery Injection
547
- AJAX Footprinting
548
- XSS Through HTTP Headers
549
- Forceful Browsing
550
- OS Command Injection
551
- Pharming
552
- Buffer Overflow in Local Command-Line Utilities
553
- Reflection Attack in Authentication Protocol
554
- Forced Integer Overflow
555
- Log Injection-Tampering-Forging
556
- Adversary in the Middle (AiTM)
557
- WSDL Scanning
558
- Block Access to Libraries
559
- Cryptanalysis
560
- Phishing
552
+ Network Topology Mapping
553
+ Privilege Abuse
554
+ Hardware Component Substitution
555
+ Leveraging Race Conditions via Symbolic Links
556
+ Physically Hacking Hardware
557
+ Using Slashes and URL Encoding Combined to Bypass Validation Logic
558
+ Spear Phishing
559
+ Cellular Rogue Base Station
560
+ The MITRE Corporation