Logo
-

Byte Open Security

(ByteOS Network)

Log In

Sign Up

ByteOS

Security
Vulnerability Details
Registries
Custom Views
Weaknesses
Attack Patterns
Filters & Tools
CAPEC-224:Fingerprinting
Attack Pattern ID:224
Version:v3.9
Attack Pattern Name:Fingerprinting
Abstraction:Meta
Status:Stable
Likelihood of Attack:High
Typical Severity:Very Low
DetailsContent HistoryRelated WeaknessesReports
▼Description
An adversary compares output from a target system to known indicators that uniquely identify specific details about the target. Most commonly, fingerprinting is done to determine operating system and application versions. Fingerprinting can be done passively as well as actively. Fingerprinting by itself is not usually detrimental to the target. However, the information gathered through fingerprinting often enables an adversary to discover existing weaknesses in the target.
▼Extended Description
▼Alternate Terms
▼Relationships
NatureTypeIDName
ParentOfS312Active OS Fingerprinting
ParentOfS313Passive OS Fingerprinting
ParentOfS541Application Fingerprinting
Nature: ParentOf
Type: Standard
ID: 312
Name: Active OS Fingerprinting
Nature: ParentOf
Type: Standard
ID: 313
Name: Passive OS Fingerprinting
Nature: ParentOf
Type: Standard
ID: 541
Name: Application Fingerprinting
▼Execution Flow
▼Prerequisites
A means by which to interact with the target system directly.
▼Skills Required
Medium

Some fingerprinting activity requires very specific knowledge of how different operating systems respond to various TCP/IP requests. Application fingerprinting can be as easy as envoking the application with the correct command line argument, or mouse clicking in the appropriate place on the screen.

▼Resources Required
If on a network, the adversary needs a tool capable of viewing network communications at the packet level and with header information, like Mitmproxy, Wireshark, or Fiddler.
▼Indicators
▼Consequences
ScopeLikelihoodImpactNote
ConfidentialityN/ARead DataN/A
Scope: Confidentiality
Likelihood: N/A
Impact: Read Data
Note: N/A
▼Mitigations
While some information is shared by systems automatically based on standards and protocols, remove potentially sensitive information that is not necessary for the application's functionality as much as possible.
▼Example Instances
▼Related Weaknesses
IDName
CWE-200Exposure of Sensitive Information to an Unauthorized Actor
ID: CWE-200
Name: Exposure of Sensitive Information to an Unauthorized Actor
▼Taxonomy Mappings
Taxonomy NameEntry IDEntry Name
WASC45Fingerprinting
Taxonomy Name: WASC
Entry ID: 45
Entry Name: Fingerprinting
▼Notes
▼References
Details not found