CAPEC-169 Metadata
Likelihood of Attack
High
Typical Severity
Very Low
Overview
Summary
An adversary engages in probing and exploration activities to identify constituents and properties of the target.
Prerequisites
An application must publicize identifiable information about the system or application through voluntary or involuntary means. Certain identification details of information systems are visible on communication networks (e.g., if an adversary uses a sniffer to inspect the traffic) due to their inherent structure and protocol standards. Any system or network that can be detected can be footprinted. However, some configuration choices may limit the useful information that can be collected during a footprinting attack.
Execution Flow
Step | Phase | Description | Techniques |
---|---|---|---|
1 | Explore | [Request Footprinting] The attacker examines the website information and source code of the website and uses automated tools to get as much information as possible about the system and organization. |
|
Potential Solutions / Mitigations
Keep patches up to date by installing weekly or daily if possible. Shut down unnecessary services/ports. Change default passwords by choosing strong passwords. Curtail unexpected input. Encrypt and password-protect sensitive data. Avoid including information that has the potential to identify and compromise your organization's security such as access to business plans, formulas, and proprietary documents.
Related Weaknesses (CWE)
CWE ID | Description |
---|---|
CWE-200 | Exposure of Sensitive Information to an Unauthorized Actor |
Taxonomy Mappings
Taxonomy: ATTACK
Stay Ahead of Attack Patterns
Understanding CAPEC patterns helps security professionals anticipate and thwart potential attacks. Leverage these insights to enhance threat modeling, strengthen your software development lifecycle, and train your security teams effectively.