Dark Mode

Settings

Capec-569 Detail

Collect Data as Provided by Users

Standard Software

Parents: 116

Children: 568

Threats: T60 T65 T258 T273 T291 T302

Description

An attacker leverages a tool, device, or program to obtain specific information as provided by a user of the target system. This information is often needed by the attacker to launch a follow-on attack. This attack is different than Social Engineering as the adversary is not tricking or deceiving the user. Instead the adversary is putting a mechanism in place that captures the information that a user legitimately enters into a system. Deploying a keylogger, performing a UAC prompt, or wrapping the Windows default credential provider are all examples of such interactions.

Not present

External ID Source Link Description
CAPEC-569 capec https://capec.mitre.org/data/definitions/569.html
T1056 ATTACK https://attack.mitre.org/wiki/Technique/T1056 Input Capture

Not present

Not present

Not present

Not present

Not present

Not present