Dark Mode
Capec-646 Detail
Peripheral Footprinting
Standard Software Likelihood: Low Typical Severity: Medium
Parents: 169
Threats: T60 T65 T80 T258 T288 T291 T302 T334 T392 T407
Adversaries may attempt to obtain information about attached peripheral devices and components connected to a computer system. Examples may include discovering the presence of iOS devices by searching for backups, analyzing the Windows registry to determine what USB devices have been connected, or infecting a victim system with malware to report when a USB device has been connected. This may allow the adversary to gain additional insight about the system or network environment, which may be useful in constructing further attacks.
Not present
| External ID | Source | Link | Description |
|---|---|---|---|
| CAPEC-646 | capec | https://capec.mitre.org/data/definitions/646.html | |
| CWE-200 | cwe | http://cwe.mitre.org/data/definitions/200.html | |
| T1120 | ATTACK | https://attack.mitre.org/wiki/Technique/T1120 | Peripheral Device Discovery |
Not present
- The adversary needs either physical or remote access to the victim system.
Not present
| Medium |
|---|
| If analyzing the Windows registry, the adversary must understand the registry structure to know where to look for devices. |
Not present
Not present