Prerequisites
The operating system must support a file system that allows for alternate data storage for a file.
Mitigations
Many tools are available to search for the hidden data. Scan regularly for such data using one of these tools.
Related Weaknesses
CWE-ID |
Weakness Name |
|
Embedded Malicious Code The product contains code that appears to be malicious in nature. |
References
REF-493
Alternate Data Streams: Out of the Shadows and into the Light
Means, Ryan L..
https://www.giac.org/paper/gcwn/230/alternate-data-streams-shadows-light/104234
Submission
Name |
Organization |
Date |
Date release |
CAPEC Content Team |
The MITRE Corporation |
2018-05-31 +00:00 |
|
Modifications
Name |
Organization |
Date |
Comment |
CAPEC Content Team |
The MITRE Corporation |
2019-04-04 +00:00 |
Updated Taxonomy_Mappings |
CAPEC Content Team |
The MITRE Corporation |
2020-07-30 +00:00 |
Updated Taxonomy_Mappings |
CAPEC Content Team |
The MITRE Corporation |
2021-06-24 +00:00 |
Updated Taxonomy_Mappings |
CAPEC Content Team |
The MITRE Corporation |
2022-09-29 +00:00 |
Updated Taxonomy_Mappings |
CAPEC Content Team |
The MITRE Corporation |
2023-01-24 +00:00 |
Updated Related_Weaknesses |