CAPEC 647 Collect Data from Registries

Draft Detailed Medium Risk
Severity Medium

Description

An adversary exploits a weakness in authorization to gather system-specific data and sensitive information within a registry (e.g., Windows Registry, Mac plist). These contain information about the system configuration, software, operating system, and security. The adversary can leverage information gathered in order to carry out further attacks.

Attack Execution Flow

4

Mitigations

2

Consequences

Relationships

Related ATT&CK Techniques

3

Resources Required

1