darkcybe
search
⌘Ctrlk
darkcybe
  • πŸ‘‹whoami
  • Security Operations
    • πŸ’‰Threat Mangement
    • πŸ‘©β€πŸ’»Threat Detection
    • πŸš’Threat Response
  • Offensive Security Operations
    • 🎯Penetration Testing
      • Techniques
        • MITRE ATT&CK
        • CAPEC
          • 100 - Overflow Buffers
          • 66 - SQL Injection
          • 94 - Adversary-in-the-Middle (AiTM)
          • 252 - PHP Local File Inclusion (LFI)
          • 560 - Use of Known Domain Credentials
          • 644 - Use of Captured Hashes (Pass-the-Hash (PtH))
          • 633 - Token Impersonation
        • Technology Focused
      • Offensive Security Tools
    • 🚩Capture The Flag (CTF)
  • Guides
    • πŸ”DFIR
    • πŸ₯·Ethical Hacking
    • β›³CTF Walkthroughs
    • πŸ‘·β€β™€οΈSecurity Engineering
  • General Resources
    • 🐳Deep Dives
    • 🐍Programming
    • πŸ‹οΈTraining
    • πŸ₯ Semi-Pro Tips
gitbookPowered by GitBook
block-quoteOn this pagechevron-down
  1. Offensive Security Operationschevron-right
  2. 🎯Penetration Testingchevron-right
  3. Techniques

CAPEC

Guides on the various attack techniques and methods as defined by the CAPEC framework.

100 - Overflow Bufferschevron-right66 - SQL Injectionchevron-right94 - Adversary-in-the-Middle (AiTM)chevron-right252 - PHP Local File Inclusion (LFI)chevron-right560 - Use of Known Domain Credentialschevron-right644 - Use of Captured Hashes (Pass-the-Hash (PtH))chevron-right633 - Token Impersonationchevron-right
PreviousImpactchevron-leftNext100 - Overflow Bufferschevron-right

Last updated 2 years ago