Pluridentity Attack

From Cognitive Attack Taxonomy
Revision as of 03:19, 30 July 2024 by Info (talk | contribs) (Created page with "== '''Pluridentity Attack ''' == '''Short Description:''' Using data acquired from multiple sources to gain access to unintentional access to sensitive data. <br> '''CAT ID:''' CAT-2022-145 <br> '''Layer:''' 7,8,9,10 <br> '''Operational Scale:''' Multiple Scales <br> '''Level of Maturity:''' Proof of Concept <br> '''Category:''' Exploit <br> '''Subcategory:''' <br> '''Also Known As:''' <br> == '''Description:''' == '''Brief Description:''' <br> '''Close...")
(diff) ← Older revision | Latest revision (diff) | Newer revision → (diff)

Pluridentity Attack

Short Description: Using data acquired from multiple sources to gain access to unintentional access to sensitive data.

CAT ID: CAT-2022-145

Layer: 7,8,9,10

Operational Scale: Multiple Scales

Level of Maturity: Proof of Concept

Category: Exploit

Subcategory:

Also Known As:

Description:

Brief Description:

Closely Related Concepts:

Mechanism:

Multipliers:

Detailed Description: Using data acquired from multiple sources to gain access to unintentional access to sensitive data. (Exploits Data Vulnerability) For example, reviewing multiple password reset platforms which reveal mobile phone numbers to reset through SMS. If each platform reveals different parts of the mobile number (prefix, suffix, etc.) which the attacker may reassemble into the whole mobile number.

INTERACTIONS [VETs]:

Examples:

Use Case Example(s):

Example(s) From The Wild:

Comments:

References: