Threats Library

Reusable threat definitions (causes on the left side of bow-tie diagrams).

Add Threat

Tags: clear tags
Clear all
5 threats — page 1 of 1
Name Category Tags Description
Input Capture Collection Adversaries may use methods of capturing user input to obtain credentials or collect information. Du… Edit
Input Capture: Credential API Hooking Collection Adversaries may hook into Windows application programming interface (API) functions and Linux system… Edit
Input Capture: GUI Input Capture Collection Adversaries may mimic common operating system GUI components to prompt users for credentials with a … Edit
Input Capture: Keylogging Collection Adversaries may log user keystrokes to intercept credentials as the user types them. Keylogging is l… Edit
Input Capture: Web Portal Capture Collection Adversaries may install code on externally facing portals, such as a VPN login page, to capture and … Edit