Threats Library
Reusable threat definitions (causes on the left side of bow-tie diagrams).
Add Threat
Tags:
clear tags
7 threats — page 1 of 1
| Name | Category | Tags | Description | |
|---|---|---|---|---|
| Abuse Elevation Control Mechanism: TCC Manipulation | Defense Evasion | Adversaries can manipulate or abuse the Transparency, Consent, & Control (TCC) service or database t… | Edit | |
| Abuse Elevation Control Mechanism | Privilege Escalation | Adversaries may circumvent mechanisms designed to control elevate privileges to gain higher-level pe… | Edit | |
| Abuse Elevation Control Mechanism: Bypass User Account Control | Privilege Escalation | Adversaries may bypass UAC mechanisms to elevate process privileges on system. Windows User Account … | Edit | |
| Abuse Elevation Control Mechanism: Elevated Execution with Prompt | Privilege Escalation | Adversaries may leverage the AuthorizationExecuteWithPrivileges API to escalate privileges by prompt… | Edit | |
| Abuse Elevation Control Mechanism: Setuid and Setgid | Privilege Escalation | An adversary may abuse configurations where an application has the setuid or setgid bits set in orde… | Edit | |
| Abuse Elevation Control Mechanism: Sudo and Sudo Caching | Privilege Escalation | Adversaries may perform sudo caching and/or use the sudoers file to elevate privileges. Adversaries … | Edit | |
| Abuse Elevation Control Mechanism: Temporary Elevated Cloud Access | Privilege Escalation | Adversaries may abuse permission configurations that allow them to gain temporarily elevated access … | Edit |