CAPEC 37 Retrieve Embedded Sensitive Data

Draft Detailed High Risk
Severity Very High

Description

An attacker examines a target system to find sensitive data that has been embedded within it. This information can reveal confidential contents, such as account numbers or individual keys/credentials that can be used as an intermediate step in a larger attack.

Attack Execution Flow

2

Consequences

Relationships

Related ATT&CK Techniques

2

Resources Required

1