CAPEC 653 Use of Known Operating System Credentials

Draft Standard High Risk
Severity High

Description

An adversary guesses or obtains (i.e. steals or purchases) legitimate operating system credentials (e.g. userID/password) to achieve authentication and to perform authorized actions on the system, under the guise of an authenticated user or service. This applies to any Operating System.

Attack Execution Flow

5

Mitigations

8

Consequences

Indicators

5

Relationships

Resources Required

2