CAPEC-497: File Discovery

An adversary engages in probing and exploration activities to determine if common key files exists. Such files often contain configuration and security parameters of the targeted application, system or network. Using this knowledge may often pave the way for more damaging attacks.

Severity
Very Low
Likelihood
High
14
/ 100
low-risk
Active Threat 12/50 · Low
Exploit Availability 2/50 · Minimal