Threats Library
Reusable threat definitions (causes on the left side of bow-tie diagrams).
Add Threat
Tags:
clear tags
5 threats — page 1 of 1
| Name | Category | Tags | Description | |
|---|---|---|---|---|
| Input Capture | Collection | Adversaries may use methods of capturing user input to obtain credentials or collect information. Du… | Edit | |
| Input Capture: Credential API Hooking | Collection | Adversaries may hook into Windows application programming interface (API) functions and Linux system… | Edit | |
| Input Capture: GUI Input Capture | Collection | Adversaries may mimic common operating system GUI components to prompt users for credentials with a … | Edit | |
| Input Capture: Keylogging | Collection | Adversaries may log user keystrokes to intercept credentials as the user types them. Keylogging is l… | Edit | |
| Input Capture: Web Portal Capture | Collection | Adversaries may install code on externally facing portals, such as a VPN login page, to capture and … | Edit |