Reverse Engineering
Attack Pattern ID: 188 (Meta Attack Pattern Completeness: Complete)Typical Severity: LowStatus: Draft
+ Description

Summary

An attacker discovers the structure, function, and composition of an object, resource, or system by using a variety of analysis techniques to effectively determine how the analyzed entity was constructed or operates. The goal of reverse engineering is often to duplicate the function, or a part of the function, of an object in order to duplicate or "back engineer" some aspect of its functioning. Reverse engineering techniques can be applied to mechanical objects, electronic devices or components, or to software, although the methodology and techniques involved in each type of analysis differ widely.

+ Resources Required

Access to or control of an object, resource, or system, to be analyzed. The technical resources required to engage in reverse engineering differ in accordance with the type of object, resource, or system being analyzed.

+ Related Weaknesses
CWE-IDWeakness NameWeakness Relationship Type
798Use of Hard-coded CredentialsTargeted
259Use of Hard-coded PasswordSecondary
+ Related Attack Patterns
NatureTypeIDNameDescriptionView(s) this relationship pertains toView\(s\)
ChildOfAttack PatternAttack Pattern281Analytic Attacks 
Mechanism of Attack (primary)1000
ParentOfAttack PatternAttack Pattern189Software Reverse Engineering 
Mechanism of Attack (primary)1000
ParentOfAttack PatternAttack Pattern192Protocol Reverse Engineering 
Mechanism of Attack (primary)1000
+ References

http://en.wikipedia.org/wiki/Reverse_engineering