-
CAPEC-148: Content Spoofing
- CAPEC-145: Checksum Spoofing
- CAPEC-218: Spoofing of UDDI/ebXML Messages
- CAPEC-502: Intent Spoof
-
CAPEC-627: Counterfeit GPS Signals
- CAPEC-628: Carry-Off GPS Attack
-
CAPEC-151: Identity Spoofing
-
CAPEC-194: Fake the Source of Data
- CAPEC-275: DNS Rebinding
- CAPEC-543: Counterfeit Websites
- CAPEC-544: Counterfeit Organizations
- CAPEC-598: DNS Spoofing
- CAPEC-633: Token Impersonation
-
CAPEC-195: Principal Spoof
- CAPEC-587: Cross Frame Scripting (XFS)
- CAPEC-599: Terrestrial Jamming
-
CAPEC-473: Signature Spoof
- CAPEC-459: Creating a Rogue Certification Authority Certificate
- CAPEC-474: Signature Spoofing by Key Theft
- CAPEC-475: Signature Spoofing by Improper Validation
- CAPEC-476: Signature Spoofing by Misrepresentation
- CAPEC-477: Signature Spoofing by Mixing Signed and Unsigned Content
- CAPEC-479: Malicious Root Certificate
- CAPEC-485: Signature Spoofing by Key Recreation
- CAPEC-89: Pharming
-
CAPEC-98: Phishing
- CAPEC-163: Spear Phishing
- CAPEC-164: Mobile Phishing
- CAPEC-656: Voice Phishing
-
CAPEC-154: Resource Location Spoofing
-
CAPEC-159: Redirect Access to Libraries
- CAPEC-132: Symlink Attack
- CAPEC-38: Leveraging/Manipulating Configuration File Search Paths
- CAPEC-471: Search Order Hijacking
- CAPEC-641: DLL Side-Loading
-
CAPEC-141: Cache Poisoning
- CAPEC-51: Poison Web Service Registry
- CAPEC-142: DNS Cache Poisoning
-
CAPEC-616: Establish Rogue Location
- CAPEC-505: Scheme Squatting
- CAPEC-611: BitSquatting
- CAPEC-615: Evil Twin Wi-Fi Attack
- CAPEC-617: Cellular Rogue Base Station
- CAPEC-630: TypoSquatting
- CAPEC-631: SoundSquatting
- CAPEC-632: Homograph Attack via Homoglyphs
- CAPEC-667: Bluetooth Impersonation AttackS (BIAS)
-
CAPEC-173: Action Spoofing
-
CAPEC-103: Clickjacking
- CAPEC-181: Flash File Overlay
- CAPEC-222: iFrame Overlay
- CAPEC-501: Android Activity Hijack
-
CAPEC-504: Task Impersonation
- CAPEC-654: Credential Prompt Impersonation
- CAPEC-506: Tapjacking
-
CAPEC-416: Manipulate Human Behavior
-
CAPEC-407: Pretexting
- CAPEC-383: Harvesting Information via API Event Monitoring
- CAPEC-412: Pretexting via Customer Service
- CAPEC-413: Pretexting via Tech Support
- CAPEC-414: Pretexting via Delivery Person
- CAPEC-415: Pretexting via Phone
-
CAPEC-417: Influence Perception
- CAPEC-418: Influence Perception of Reciprocation
- CAPEC-420: Influence Perception of Scarcity
- CAPEC-421: Influence Perception of Authority
- CAPEC-422: Influence Perception of Commitment and Consistency
- CAPEC-423: Influence Perception of Liking
- CAPEC-424: Influence Perception of Consensus or Social Proof
- CAPEC-425: Target Influence via Framing
- CAPEC-426: Influence via Incentives
-
CAPEC-427: Influence via Psychological Principles
- CAPEC-428: Influence via Modes of Thinking
- CAPEC-429: Target Influence via Eye Cues
- CAPEC-433: Target Influence via The Human Buffer Overflow
- CAPEC-434: Target Influence via Interview and Interrogation
- CAPEC-435: Target Influence via Instant Rapport
- CAPEC-389: Content Spoofing Via Application API Manipulation
- This work is licensed under a Creative Commons Attribution-NoDerivatives 4.0 International License.
Brett Crawley
- LICENSE
The MITRE Corporation (MITRE) hereby grants you a non-exclusive, royalty-free license to use Common Attack Pattern Enumeration and Classification (CAPEC™) for research, development, and commercial purposes. Any copy you make for such purposes is authorized provided that you reproduce MITRE’s copyright designation and this license in any such copy.
DISCLAIMERS
ALL DOCUMENTS AND THE INFORMATION CONTAINED THEREIN ARE PROVIDED ON AN "AS IS" BASIS AND THE CONTRIBUTOR, THE ORGANIZATION HE/SHE REPRESENTS OR IS SPONSORED BY (IF ANY), THE MITRE CORPORATION, ITS BOARD OF TRUSTEES, OFFICERS, AGENTS, AND EMPLOYEES, DISCLAIM ALL WARRANTIES, EXPRESS OR IMPLIED, INCLUDING BUT NOT LIMITED TO ANY WARRANTY THAT THE USE OF THE INFORMATION THEREIN WILL NOT INFRINGE ANY RIGHTS OR ANY IMPLIED WARRANTIES OF MERCHANTABILITY OR FITNESS FOR A PARTICULAR PURPOSE.