"other open source office suites like libre office and openoffice. 26 - / v1 / agent / self or / v1 / agent / service / register – these two paths are targeting a remote command execution vulnerability in the hashicorp consul service mesh api. the exploit for this vulnerability wa…"
Which technique(s) should be tagged here? Pick zero or more — leaving blank just records that the original was wrong.
No matches for .
Loading techniques…
T1190Exploit Public-Facing Application
78%
"log _ browser / validate – this is another path whose intended target and function we do not understand, but we can reasonably guess that it was targeting the api of network traffic logging, server logging, or similar appliance, possibly for the purposes of network reconnaissance…"
Which technique(s) should be tagged here? Pick zero or more — leaving blank just records that the original was wrong.
No matches for .
Loading techniques…
T1525Implant Internal Image
70%
"##s. because they are not intended for human use, apis are often set up to access any data within the application environment. permissions are usually set up for the user making the original request, and these permissions are, in turn, passed to the api. that is all well and good…"
Which technique(s) should be tagged here? Pick zero or more — leaving blank just records that the original was wrong.
No matches for .
Loading techniques…
T1525Implant Internal Image
32%
"and data translation role, coordinating disparate and distributed functions behind the scenes to present the user with a unified application service. from a security standpoint, this is what really matters : the user experience is that of one app. in other words, apis raise the s…"
Which technique(s) should be tagged here? Pick zero or more — leaving blank just records that the original was wrong.
No matches for .
Loading techniques…
Summary
API use has grown tremendously as applications grow more decentralized. Some large apps have hundreds of APIs, and mobile apps depend on them completely.