Dark Mode
Capec-203 Detail
Manipulate Registry Information
Standard Software Typical Severity: Medium
Parents: 176
Children: 51 270 478
Threats: T62 T68 T269 T270 T271 T272 T273 T274 T297 T393
An adversary exploits a weakness in authorization in order to modify content within a registry (e.g., Windows Registry, Mac plist, application registry). Editing registry information can permit the adversary to hide configuration information or remove indicators of compromise to cover up activity. Many applications utilize registries to store configuration and service information. As such, modification of registry information can affect individual services (affecting billing, authorization, or even allowing for identity spoofing) or the overall configuration of a targeted application. For example, both Java RMI and SOAP use registries to track available services. Changing registry values is sometimes a preliminary step towards completing another attack pattern, but given the long term usage of many registry values, manipulation of registry information could be its own end.
Not present
| External ID | Source | Link | Description |
|---|---|---|---|
| CAPEC-203 | capec | https://capec.mitre.org/data/definitions/203.html | |
| CWE-15 | cwe | http://cwe.mitre.org/data/definitions/15.html | |
| T1112 | ATTACK | https://attack.mitre.org/wiki/Technique/T1112 | Modify Registry |
| T1647 | ATTACK | https://attack.mitre.org/wiki/Technique/T1647 | Plist Modification |
Not present
- The targeted application must rely on values stored in a registry.
- The adversary must have a means of elevating permissions in order to access and modify registry content through either administrator privileges (e.g., credentialed access), or a remote access tool capable of editing a registry through an API.
- None: No specialized resources are required to execute this type of attack.
| High |
|---|
| The adversary requires privileged credentials or the development/acquiring of a tailored remote access tool. |
Not present
- Manipulating registration information can be undertaken in advance of a path traversal attack (inserting relative path modifiers) or buffer overflow attack (enlarging a registry value beyond an application's ability to store it).