Dark Mode
Capec-639 Detail
Probe System Files
Detailed Software Typical Severity: Medium
Parents: 545
Threats: T258 T291 T302
An adversary obtains unauthorized information due to improperly protected files. If an application stores sensitive information in a file that is not protected by proper access control, then an adversary can access the file and search for sensitive information.
Not present
| External ID | Source | Link | Description |
|---|---|---|---|
| CAPEC-639 | capec | https://capec.mitre.org/data/definitions/639.html | |
| CWE-552 | cwe | http://cwe.mitre.org/data/definitions/552.html | |
| T1039 | ATTACK | https://attack.mitre.org/wiki/Technique/T1039 | Data from Network Shared Drive |
| T1552.001 | ATTACK | https://attack.mitre.org/wiki/Technique/T1552/001 | Unsecured Credentials: Credentials in Files |
| T1552.003 | ATTACK | https://attack.mitre.org/wiki/Technique/T1552/003 | Unsecured Credentials: Bash History |
| T1552.004 | ATTACK | https://attack.mitre.org/wiki/Technique/T1552/004 | Unsecured Credentials: Private Keys |
| T1552.006 | ATTACK | https://attack.mitre.org/wiki/Technique/T1552/006 | Unsecured Credentials: Group Policy Preferences |
Not present
- An adversary has access to the file system of a system.
Not present
Not present
| Confidentiality |
|---|
| Read Data |
- Adversaries may search local file systems and remote file shares for files containing passwords. These can be files created by users to store their own credentials, shared credential stores for a group of individuals, configuration files containing passwords for a system or service, or source code/binary files containing embedded passwords.
- Adversaries may search network shares on computers they have compromised to find files of interest.