Matrices
Enterprise
Mobile
ICS
Tactics
Enterprise
Mobile
ICS
Techniques
Enterprise
Mobile
ICS
Defenses
Mitigations
Enterprise
Mobile
ICS
Assets
Detections
Detection Strategies
Analytics
Data Components
CTI
Groups
Software
Campaigns
Search
Unofficial community mirror of
attack.mitre.org
— content © The MITRE Corporation. For authoritative content, always refer to the official site.
Home
Data Components
Permissions Request
Permissions Request
System prompts triggered when an application requests new or additional permissions
ID:
DC0116
Domains
: Mobile
Version
: 2.0
Created
: 13 March 2023
Last Modified
: 21 October 2025
Log Sources
Name
Channel
User Interface
None
Detection Strategy
ID
Name
Technique Detected
DET0623
Detection of Adversary-in-the-Middle
T1638
DET0671
Detection of Data Destruction
T1662
DET0624
Detection of Remote Access Software
T1663
DET0606
Detection of Virtualization Solution
T1670
×
Core Objects:
All
Core ATT&CK Objects
All
None
Matrices
Tactics
Techniques
Sub-Techniques
Defenses:
All
Defenses
All
None
Mitigations
Assets
Detection Strategies
Analytics
Data Components
CTI:
All
CTI
All
None
Groups
Software
Campaigns
Reference:
All
Reference
All
None
Resources
Domains:
All
Domains
All
None
Enterprise
Mobile
ICS
Reset filters