CAPEC-580 System Footprinting

CAPEC ID: 580

CAPEC-580 Metadata

Likelihood of Attack

Low

Typical Severity

Low

Overview

Summary

An adversary engages in active probing and exploration activities to determine security information about a remote target system. Often times adversaries will rely on remote applications that can be probed for system configurations.

Prerequisites

The adversary must have logical access to the target network and system.

Potential Solutions / Mitigations

Keep patches up to date by installing weekly or daily if possible. Identify programs that may be used to acquire peripheral information and block them by using a software restriction policy or tools that restrict program execution by using a process allowlist.

Related Weaknesses (CWE)

CWE ID Description
CWE-204 Observable Response Discrepancy
CWE-205 Observable Behavioral Discrepancy
CWE-208 Observable Timing Discrepancy

Related CAPECs

CAPEC ID Description
CAPEC-169 An adversary engages in probing and exploration activities to identify constituents and properties of the target.

Taxonomy Mappings

Taxonomy: ATTACK

Entry ID Entry Name
1082 System Information Discovery

Stay Ahead of Attack Patterns

Understanding CAPEC patterns helps security professionals anticipate and thwart potential attacks. Leverage these insights to enhance threat modeling, strengthen your software development lifecycle, and train your security teams effectively.