CAPEC-529 Metadata
Likelihood of Attack
Medium
Typical Severity
Medium
Overview
Summary
Adversary uses malware or a similarly controlled application installed inside an organizational perimeter to gather information about the composition, configuration, and security mechanisms of a targeted application, system or network.
Prerequisites
The adversary must have internal, logical access to the target network and system.
Potential Solutions / Mitigations
Keep patches up to date by installing weekly or daily if possible. Identify programs that may be used to acquire peripheral information and block them by using a software restriction policy or tools that restrict program execution by using a process allowlist.
Related CAPECs
CAPEC ID | Description |
---|---|
CAPEC-169 | An adversary engages in probing and exploration activities to identify constituents and properties of the target. |
Stay Ahead of Attack Patterns
Understanding CAPEC patterns helps security professionals anticipate and thwart potential attacks. Leverage these insights to enhance threat modeling, strengthen your software development lifecycle, and train your security teams effectively.