CAPEC-410: Information Elicitation |
Description An adversary engages an individual using any combination of social engineering methods for the purpose of extracting information. Accurate contextual and environmental queues, such as knowing important information about the target company or individual can greatly increase the success of the attack and the quality of information gathered. Authentic mimicry combined with detailed knowledge increases the success of elicitation attacks. Typical Severity References Content History | Submissions |
|---|
| Submission Date | Submitter | Organization |
|---|
| 2014-06-23 (Version 2.6) | CAPEC Content Team | The MITRE Corporation | | | Modifications |
|---|
| Modification Date | Modifier | Organization |
|---|
| 2017-08-04 (Version 2.11) | CAPEC Content Team | The MITRE Corporation | | Updated Description Summary | | Previous Entry Names |
|---|
| Change Date | Previous Entry Name |
|---|
| 2017-08-04 (Version 2.11) | Information Elicitation via Social Engineering | |
More information is available — Please select a different filter.
|