Dark Mode
Capec-569 Detail
Collect Data as Provided by Users
Standard Software
Parents: 116
Children: 568
Threats: T60 T65 T258 T273 T291 T302
An attacker leverages a tool, device, or program to obtain specific information as provided by a user of the target system. This information is often needed by the attacker to launch a follow-on attack. This attack is different than Social Engineering as the adversary is not tricking or deceiving the user. Instead the adversary is putting a mechanism in place that captures the information that a user legitimately enters into a system. Deploying a keylogger, performing a UAC prompt, or wrapping the Windows default credential provider are all examples of such interactions.
Not present
| External ID | Source | Link | Description |
|---|---|---|---|
| CAPEC-569 | capec | https://capec.mitre.org/data/definitions/569.html | |
| T1056 | ATTACK | https://attack.mitre.org/wiki/Technique/T1056 | Input Capture |
Not present
Not present
Not present
Not present
Not present
Not present