Dark Mode

Settings

Capec-646 Detail

Peripheral Footprinting

Standard Software Likelihood: Low Typical Severity: Medium

Parents: 169

Threats: T60 T65 T80 T258 T288 T291 T302 T334 T392 T407

Description

Adversaries may attempt to obtain information about attached peripheral devices and components connected to a computer system. Examples may include discovering the presence of iOS devices by searching for backups, analyzing the Windows registry to determine what USB devices have been connected, or infecting a victim system with malware to report when a USB device has been connected. This may allow the adversary to gain additional insight about the system or network environment, which may be useful in constructing further attacks.

Not present

External ID Source Link Description
CAPEC-646 capec https://capec.mitre.org/data/definitions/646.html
CWE-200 cwe http://cwe.mitre.org/data/definitions/200.html
T1120 ATTACK https://attack.mitre.org/wiki/Technique/T1120 Peripheral Device Discovery

Not present

  1. The adversary needs either physical or remote access to the victim system.

Not present

Medium
If analyzing the Windows registry, the adversary must understand the registry structure to know where to look for devices.

Not present

Not present