Skip to content
SynAc
Discovery

Recently updated

Published entries ordered by most recent updates.

  1. bulk encryptionJan 06, 2026

    Encryption of multiple channels by aggregating them into a single transfer path and then encrypting that path. (See: channel.)

  2. Adversaries may use a spearphishing attachment, a variant of spearphishing, as a form of a social engineering attack against specific targets. Spearphishing attachments are different from other forms of spearphishing in that they employ malware attached to an email. All forms of spearphishing are electronically delivered and target a specific individual, company, or industry. In this scenario, adversaries attach a file to the spearphishing email and usually rely upon User Execution to gain execution and access. (Citation: Enterprise ATT&CK October 2019)

  3. EALJan 06, 2026

    See: evaluation assurance level.

  4. Buffer OverflowJan 06, 2026

    A buffer overflow condition exists when a program attempts to put more data in a buffer than it can hold or when a program attempts to put data in a memory area past a buffer. In this case, a buffer is a sequential section of memory allocated to contain anything from a character string to an array of integers. Writing outside the bounds of a block of allocated memory can corrupt data, crash the program, or cause the execution of malicious code.

  5. adequate securityJan 06, 2026

    Security commensurate with the risk and the magnitude of harm resulting from the loss, misuse, or unauthorized access to or modification of information.

  6. Alice and BobJan 06, 2026

    The parties that are most often called upon to illustrate the operation of bipartite security protocols. These and other dramatis personae are listed by Schneier [Schn].

  7. benignJan 06, 2026

    "Condition of cryptographic data [such] that [the data] cannot be compromised by human access [to the data]." [C4009]

  8. A characterization of (a) the strength of a security function, mechanism, service, or solution and (b) the assurance (or confidence) that it is implemented and functioning. [Cons, IATF] (See: level of concern.)

  9. A type of checksum algorithm that is not a cryptographic hash but is used to implement data integrity service where accidental changes to data are expected. Sometimes called "cyclic redundancy code".

  10. Adversaries may carry out malicious operations using virtualization solutions to escape from Android sandboxes and to avoid detection. Android uses sandboxes to separate resources and code execution between applications and the operating system.(Citation: Android Application Sandbox) There are a few virtualization solutions available on Android, such as the Android Virtualization Framework (AVF).(Citation: Android AVF Overview)

  11. Adversaries may search common password storage locations to obtain user credentials. Passwords can be stored in several places on a device, depending on the operating system or application holding the credentials. There are also specific applications that store passwords to make it easier for users to manage and maintain. Once credentials are obtained, they can be used to perform lateral movement and access restricted information.

  12. Adversaries may exploit software vulnerabilities in client applications to execute code. Vulnerabilities can exist in software due to insecure coding practices that can lead to unanticipated behavior. Adversaries may take advantage of certain vulnerabilities through targeted exploitation for the purpose of arbitrary code execution. Oftentimes the most valuable exploits to an offensive toolkit are those that can be used to obtain code execution on a remote system because they can be used to gain access to that system. Users will expect to see files related to the applications they commonly used to do work, so they are a useful target for exploit research and development because of their high utility.

  13. draft RFCJan 06, 2026

    A preliminary, temporary version of a document that is intended to become an RFC. (Compare: Internet Draft.)

  14. An extension framework for PPP that supports multiple, optional authentication mechanisms, including cleartext passwords, challenge response, and arbitrary dialog sequences. [R3748] (Compare: GSS API, SASL.)

  15. ESPJan 06, 2026

    See: Encapsulating Security Payload.

  16. certification pathJan 06, 2026

    A linked sequence of one or more public key certificates, or one or more public key certificates and one attribute certificate, that enables a certificate user to verify the signature on the last certificate in the path, and thus enables the user to obtain (from that last certificate) a certified public key, or certified attributes, of the system entity that is the subject of that last certificate. (See: trust anchor, certificate validation, valid certificate.)

  17. Adversaries may attempt to disrupt essential components or systems to prevent owner and operator from delivering products or services. (Citation: Corero) (Citation: Michael J. Assante and Robert M. Lee) (Citation: Tyson Macaulay)

  18. audit serviceJan 06, 2026

    A security service that records information needed to establish accountability for system events and for the actions of system entities that cause them. (See: security audit.)

  19. ARPANETJan 06, 2026

    Advanced Research Projects Agency (ARPA) Network, a pioneer packet switched network that (a) was designed, implemented, operated, and maintained by BBN from January 1969 until July 1975 under contract to the U.S. Government; (b) led to the development of today's Internet; and (c) was decommissioned in June 1990. [B4799, Hafn]

  20. code signingJan 06, 2026

    A security mechanism that uses a digital signature to provide data integrity and data origin authentication for software that is being distributed for use. (See: mobile code, trusted distribution.)

  21. A certificate document in the form of a digital data object (a data object used by a computer) to which is appended a computed digital signature value that depends on the data object. (See: attribute certificate, public key certificate.)

  22. hash codeJan 06, 2026

    Synonym for "hash result" or "hash function".

  23. IPLIJan 06, 2026

    See: Internet Private Line Interface.

  24. internal controlsJan 06, 2026

    Functions, features, and technical characteristics of computer hardware and software, especially of operating systems. Includes mechanisms to regulate the operation of a computer system with regard to access control, flow control, and inference control. (Compare: external controls.)

  25. impossibleJan 06, 2026

    Cannot be done in any reasonable amount of time. (See: break, brute force, strength, work factor.)

  26. An open source software module that is designed to be integrated with an application for routing, replying to, and otherwise managing and meditating certificate validation requests between that application and the CAs in the ACES PKI.

  27. DNSJan 06, 2026

    Adversaries may gather information about the victim's DNS that can be used during targeting. DNS information may include a variety of details, including registered name servers as well as records that outline addressing for a target’s subdomains, mail servers, and other hosts. DNS MX, TXT, and SPF records may also reveal the use of third party cloud and SaaS providers, such as Office 365, G Suite, Salesforce, or Zendesk.(Citation: Sean Metcalf Twitter DNS Records)

  28. Adversaries may establish command and control capabilities over commonly used application layer protocols such as HTTP(S), OPC, RDP, telnet, DNP3, and modbus. These protocols may be used to disguise adversary actions as benign network traffic. Standard protocols may be seen on their associated port or in some cases over a non standard port. Adversaries may use these protocols to reach out of the network for command and control, or in some cases to other infected devices within the network.

  29. key-auto-keyJan 06, 2026

    "Cryptographic logic [i.e., a mode of operation] using previous key to produce key." [C4009, A1523] (See: CTAK, /cryptographic operation/ under "mode".)

  30. EEJan 06, 2026

    Abbreviation of "end entity" and other terms.

  31. issueJan 06, 2026

    Generate and sign a digital certificate (or a CRL) and, usually, distribute it and make it available to potential certificate users (or CRL users). (See: certificate creation.)

  32. ingress filteringJan 06, 2026

    A method [R2827] for countering attacks that use packets with false IP source addresses, by blocking such packets at the boundary between connected networks.

  33. Adversaries may enumerate files and directories or search in specific device locations for desired information within a filesystem. Adversaries may use the information from File and Directory Discovery during automated discovery to shape follow on behaviors, including deciding if the adversary should fully infect the target and/or attempt specific actions.

  34. MCAJan 06, 2026

    See: merchant certification authority.

  35. CAJan 06, 2026

    See: certification authority.

  36. enclaveJan 06, 2026

    A set of system resources that operate in the same security domain and that share the protection of a single, common, continuous security perimeter. (Compare: domain.)

  37. Loss of ProtectionJan 06, 2026

    Adversaries may compromise protective system functions designed to prevent the effects of faults and abnormal conditions. This can result in equipment damage, prolonged process disruptions and hazards to personnel.

  38. firmwareJan 06, 2026

    Computer programs and data stored in hardware typically in read only memory (ROM) or programmable read only memory (PROM) such that the programs and data cannot be dynamically written or modified during execution of the programs. (See: hardware, software.)

  39. Adversaries may abuse Android's API method to maintain continuous sensor access. Beginning in Android 9, idle applications running in the background no longer have access to device sensors, such as the camera, microphone, and gyroscope.(Citation: Android SensorsOverview) Applications can retain sensor access by running in the foreground, using Android’s API method. This informs the system that the user is actively interacting with the application, and it should not be killed. The only requirement to start a foreground service is showing a persistent notification to the user.(Citation: Android ForegroundServices)

  40. cryptologyJan 06, 2026

    The mathematical science that deals with cryptanalysis and cryptography.

  41. A subset of the Basic Encoding Rules that always provides only one way to encode any data structure defined by ASN.1. [X690].

  42. Adversaries may steal operational information on a production environment as a direct mission outcome for personal gain or to inform future operations. This information may include design documents, schedules, rotational data, or similar artifacts that provide insight on operations. In the Bowman Dam incident, adversaries probed systems for operational data. (Citation: Mark Thompson March 2016) (Citation: Danny Yadron December 2015)

  43. FPKIJan 06, 2026

    See: Federal Public Key Infrastructure.

  44. Brute Force I/OJan 06, 2026

    Adversaries may repetitively or successively change I/O point values to perform an action. Brute Force I/O may be achieved by changing either a range of I/O point values or a single point value repeatedly to manipulate a process function. The adversary's goal and the information they have about the target environment will influence which of the options they choose. In the case of brute forcing a range of point values, the adversary may be able to achieve an impact without targeting a specific point. In the case where a single point is targeted, the adversary may be able to generate instability on the process function associated with that particular point.

  45. Software DiscoveryJan 06, 2026

    Adversaries may attempt to get a listing of applications that are installed on a device. Adversaries may use the information from Software Discovery during automated discovery to shape follow on behaviors, including whether or not to fully infect the target and/or attempts specific actions.

  46. A cryptographic key that is used to encipher application data. (Compare: key encrypting key.)

  47. An Internet protocol (RFC 2060) by which a client workstation can dynamically access a mailbox on a server host to manipulate

  48. CRAMJan 06, 2026

    See: Challenge Response Authentication Mechanism.

  49. back upJan 06, 2026

    Create a reserve copy of data or, more generally, provide alternate means to perform system functions despite loss of system resources. (See: contingency plan. Compare: archive.)

  50. emanationJan 06, 2026

    A signal (e.g., electromagnetic or acoustic) that is emitted by a system (e.g., through radiation or conductance) as a consequence (i.e., byproduct) of the system's operation, and that may contain information. (See: emanations security.)