CAPEC-203: Manipulate Registry Information

Standard Stable 严重程度: Medium

CAPEC版本: 3.9

更新日期: 2023-01-24

攻击模式描述

An adversary exploits a weakness in authorization in order to modify content within a registry (e.g., Windows Registry, Mac plist, application registry). Editing registry information can permit the adversary to hide configuration information or remove indicators of compromise to cover up activity. Many applications utilize registries to store configuration and service information. As such, modification of registry information can affect individual services (affecting billing, authorization, or even allowing for identity spoofing) or the overall configuration of a targeted application. For example, both Java RMI and SOAP use registries to track available services. Changing registry values is sometimes a preliminary step towards completing another attack pattern, but given the long term usage of many registry values, manipulation of registry information could be its own end.

前提条件

  • The targeted application must rely on values stored in a registry.
  • The adversary must have a means of elevating permissions in order to access and modify registry content through either administrator privileges (e.g., credentialed access), or a remote access tool capable of editing a registry through an API.

所需技能

High The adversary requires privileged credentials or the development/acquiring of a tailored remote access tool.

所需资源

  • None: No specialized resources are required to execute this type of attack.

缓解措施

Ensure proper permissions are set for Registry hives to prevent users from modifying keys.

Employ a robust and layered defensive posture in order to prevent unauthorized users on your system.

Employ robust identification and audit/blocking using an allowlist of applications on your system. Unnecessary applications, utilities, and configurations will have a presence in the system registry that can be leveraged by an adversary through this attack pattern.

示例实例

Manipulating registration information can be undertaken in advance of a path traversal attack (inserting relative path modifiers) or buffer overflow attack (enlarging a registry value beyond an application's ability to store it).

分类映射

分类名称 条目ID 条目名称
ATTACK 1112 Modify Registry
ATTACK 1647 Plist Modification
关键信息

CAPEC ID: CAPEC-203

抽象级别: Standard

状态: Stable

典型严重程度: Medium

相关攻击模式
相关CWE弱点