Logo
-

Byte Open Security

(ByteOS Network)

Log In

Sign Up

ByteOS

Security
Vulnerability Details
Registries
Custom Views
Weaknesses
Attack Patterns
Filters & Tools
CAPEC-395:Bypassing Electronic Locks and Access Controls
Attack Pattern ID:395
Version:v3.9
Attack Pattern Name:Bypassing Electronic Locks and Access Controls
Abstraction:Standard
Status:Draft
Likelihood of Attack:
Typical Severity:
DetailsContent HistoryRelated WeaknessesReports
▼Description
An attacker exploits security assumptions to bypass electronic locks or other forms of access controls. Most attacks against electronic access controls follow similar methods but utilize different tools. Some electronic locks utilize magnetic strip cards, others employ RFID tags embedded within a card or badge, or may involve more sophisticated protections such as voice-print, thumb-print, or retinal biometrics. Magnetic Strip and RFID technologies are the most widespread because they are cost effective to deploy and more easily integrated with other electronic security measures. These technologies share common weaknesses that an attacker can exploit to gain access to a facility protected by the mechanisms via copying legitimate cards or badges, or generating new cards using reverse-engineered algorithms.
▼Extended Description
▼Alternate Terms
▼Relationships
NatureTypeIDName
ChildOfM390Bypassing Physical Security
ParentOfD397Cloning Magnetic Strip Cards
ParentOfD398Magnetic Strip Card Brute Force Attacks
ParentOfD399Cloning RFID Cards or Chips
ParentOfD400RFID Chip Deactivation or Destruction
ParentOfD626Smudge Attack
Nature: ChildOf
Type: Meta
ID: 390
Name: Bypassing Physical Security
Nature: ParentOf
Type: Detailed
ID: 397
Name: Cloning Magnetic Strip Cards
Nature: ParentOf
Type: Detailed
ID: 398
Name: Magnetic Strip Card Brute Force Attacks
Nature: ParentOf
Type: Detailed
ID: 399
Name: Cloning RFID Cards or Chips
Nature: ParentOf
Type: Detailed
ID: 400
Name: RFID Chip Deactivation or Destruction
Nature: ParentOf
Type: Detailed
ID: 626
Name: Smudge Attack
▼Execution Flow
▼Prerequisites
▼Skills Required
▼Resources Required
▼Indicators
▼Consequences
ScopeLikelihoodImpactNote
▼Mitigations
▼Example Instances
▼Related Weaknesses
IDName
▼Taxonomy Mappings
Taxonomy NameEntry IDEntry Name
▼Notes
▼References
Reference ID: REF-33
Title: Hacking Exposed: Network Security Secrets & Solutions
Author: Stuart McClure, Joel Scambray, George Kurtz
Publication:
Publisher:McGraw Hill
Edition:6th Edition
URL:
URL Date:
Day:N/A
Month:N/A
Year:2009
Details not found