CAPEC Details
Name Probe System Files
Likelyhood of attack Typical severity
Low Medium
Summary An adversary obtains unauthorized information due to improperly protected files. If an application stores sensitive information in a file that is not protected by proper access control, then an adversary can access the file and search for sensitive information.
Prerequisites An adversary has access to the file system of a system.
Solutions Verify that files have proper access controls set, and reduce the storage of sensitive information to only what is necessary.
Related Weaknesses
CWE ID Description
CWE-552 Files or Directories Accessible to External Parties
Related CAPECS
CAPEC ID Description
CAPEC-545 An adversary who is authorized or has the ability to search known system resources, does so with the intention of gathering useful information. System resources include files, memory, and other aspects of the target system. In this pattern of attack, the adversary does not necessarily know what they are going to find when they start pulling data. This is different than CAPEC-150 where the adversary knows what they are looking for due to the common location.
Taxonomy: ATTACK
Entry ID Entry Name
1552.001 Unsecured Credentials:Credentials in Files
1039 Data from Network Shared Drive