CAPEC 268 Audit Log Manipulation

Draft Standard Unknown Risk

Description

The attacker injects, manipulates, deletes, or forges malicious log entries into the log file, in an attempt to mislead an audit of the log file or cover tracks of an attack. Due to either insufficient access controls of the log files or the logging mechanism, the attacker is able to perform such actions.

Consequences

Relationships

Related ATT&CK Techniques

4

Resources Required

1