hacker
→
CapableOf
→
get smarter
|
0.64
|
|
hacker
→
CapableOf
→
gain access
|
0.64
|
|
hacker
→
CapableOf
→
take control
|
0.56
|
|
hacker
→
CapableOf
→
gained access
|
0.55
|
|
hacker
→
CapableOf
→
get into network
|
0.54
|
|
hacker
→
CapableOf
→
find new ways
|
0.54
|
|
hacker
→
CapableOf
→
use tool
|
0.54
|
|
hacker
→
CapableOf
→
steal the information
|
0.54
|
|
hacker
→
CapableOf
→
develop tool
|
0.54
|
|
hacker
→
CapableOf
→
wreak havoc
|
0.53
|
|
hacker
→
CapableOf
→
gain entry
|
0.53
|
|
hacker
→
CapableOf
→
steal datum
|
0.53
|
|
hacker
→
CapableOf
→
change their tactics
|
0.52
|
|
hacker
→
CapableOf
→
remain anonymous
|
0.52
|
|
hacker
→
CapableOf
→
become more sophisticated
|
0.52
|
|
hacker
→
CapableOf
→
hone their skills
|
0.51
|
|
hacker
→
CapableOf
→
use the name
|
0.51
|
|
hacker
→
CapableOf
→
get more creative
|
0.51
|
|
hacker
→
CapableOf
→
look for way
|
0.51
|
|
hacker
→
CapableOf
→
gain unauthorized access
|
0.50
|
|
hacker
→
CapableOf
→
connect
|
0.50
|
|
hacker
→
CapableOf
→
obtain email
|
0.50
|
|
hacker
→
CapableOf
→
figured out way
|
0.50
|
|
hacker
→
CapableOf
→
come up with new techniques
|
0.50
|
|
hacker
→
CapableOf
→
improve their techniques
|
0.50
|
|
hacker
→
CapableOf
→
get the information
|
0.50
|
|
hacker
→
CapableOf
→
find loophole
|
0.50
|
|
hacker
→
CapableOf
→
use various tools
|
0.49
|
|
hacker
→
CapableOf
→
send email
|
0.49
|
|
hacker
→
CapableOf
→
get into the system
|
0.49
|
|
hacker
→
CapableOf
→
look for vulnerability
|
0.49
|
|
hacker
→
CapableOf
→
do their thing
|
0.49
|
|
hacker
→
CapableOf
→
access personal information
|
0.49
|
|
hacker
→
CapableOf
→
demand ransom
|
0.48
|
|
hacker
→
CapableOf
→
look for datum
|
0.48
|
|
hacker
→
CapableOf
→
use dictionary attack
|
0.48
|
|
hacker
→
CapableOf
→
look for target
|
0.48
|
|
hacker
→
CapableOf
→
sniff the traffic
|
0.48
|
|
hacker
→
CapableOf
→
take complete control
|
0.47
|
|
hacker
→
CapableOf
→
steal private information
|
0.47
|
|
hacker
→
CapableOf
→
use technique
|
0.47
|
|
hacker
→
CapableOf
→
infect computer
|
0.47
|
|
hacker
→
CapableOf
→
steal information
|
0.47
|
|
hacker
→
CapableOf
→
look for new ways
|
0.47
|
|
hacker
→
CapableOf
→
focus their attention
|
0.47
|
|
hacker
→
CapableOf
→
gather information
|
0.47
|
|
hacker
→
CapableOf
→
carry out attack
|
0.47
|
|
hacker
→
CapableOf
→
find vulnerability
|
0.47
|
|
hacker
→
CapableOf
→
use password
|
0.47
|
|
hacker
→
CapableOf
→
break
|
0.47
|
|
hacker
→
CapableOf
→
find workaround
|
0.47
|
|
hacker
→
CapableOf
→
evolve their techniques
|
0.47
|
|
hacker
→
CapableOf
→
collect password
|
0.46
|
|
hacker
→
CapableOf
→
keep eye
|
0.46
|
|
hacker
→
CapableOf
→
trick people
|
0.46
|
|
hacker
→
CapableOf
→
look for weakness
|
0.46
|
|
hacker
→
CapableOf
→
find information
|
0.46
|
|
hacker
→
CapableOf
→
manage to gain access
|
0.46
|
|
hacker
→
CapableOf
→
hide their activities
|
0.46
|
|
hacker
→
CapableOf
→
use available tools
|
0.46
|
|
hacker
→
CapableOf
→
guess password
|
0.45
|
|
hacker
→
CapableOf
→
use the internet
|
0.45
|
|
hacker
→
CapableOf
→
go by the name
|
0.45
|
|
hacker
→
CapableOf
→
claim responsibility
|
0.45
|
|
hacker
→
CapableOf
→
use vpn
|
0.45
|
|
hacker
→
CapableOf
→
use sophisticated tools
|
0.45
|
|
hacker
→
CapableOf
→
try to steal information
|
0.45
|
|
hacker
→
CapableOf
→
write program
|
0.45
|
|
hacker
→
CapableOf
→
infiltrate network
|
0.45
|
|
hacker
→
CapableOf
→
break into network
|
0.45
|
|
hacker
→
CapableOf
→
regain access
|
0.44
|
|
hacker
→
CapableOf
→
take advantage
|
0.44
|
|
hacker
→
CapableOf
→
develop malware
|
0.44
|
|
hacker
→
CapableOf
→
use linux
|
0.44
|
|
hacker
→
CapableOf
→
break into system
|
0.44
|
|
hacker
→
CapableOf
→
find another way
|
0.44
|
|
hacker
→
CapableOf
→
get their hands
|
0.44
|
|
hacker
→
CapableOf
→
penetrate network
|
0.44
|
|
hacker
→
CapableOf
→
achieve their goals
|
0.44
|
|
hacker
→
CapableOf
→
make attempt
|
0.44
|
|
hacker
→
CapableOf
→
look for the easiest way
|
0.44
|
|
hacker
→
CapableOf
→
look for the weakest link
|
0.44
|
|
hacker
→
CapableOf
→
use the information
|
0.43
|
|
hacker
→
CapableOf
→
retrieve password
|
0.43
|
|
hacker
→
CapableOf
→
up their game
|
0.43
|
|
hacker
→
CapableOf
→
find security holes
|
0.43
|
|
hacker
→
CapableOf
→
find website
|
0.43
|
|
hacker
→
CapableOf
→
cover their tracks
|
0.43
|
|
hacker
→
CapableOf
→
use credential
|
0.43
|
|
hacker
→
CapableOf
→
find weak link
|
0.43
|
|
hacker
→
CapableOf
→
find backdoor
|
0.43
|
|
hacker
→
CapableOf
→
initiate attack
|
0.43
|
|
hacker
→
CapableOf
→
try to gain access
|
0.43
|
|
hacker
→
CapableOf
→
follow the money
|
0.42
|
|
hacker
→
CapableOf
→
target device
|
0.42
|
|
hacker
→
CapableOf
→
log
|
0.42
|
|
hacker
→
CapableOf
→
use machine learning
|
0.42
|
|
hacker
→
CapableOf
→
deface website
|
0.42
|
|
hacker
→
CapableOf
→
try to crack password
|
0.42
|
|
hacker
→
CapableOf
→
develop way
|
0.42
|
|
hacker
→
CapableOf
→
work for china
|
0.42
|
|
hacker
→
CapableOf
→
remain undetected
|
0.42
|
|
hacker
→
CapableOf
→
steal personal information
|
0.42
|
|
hacker
→
CapableOf
→
get datum
|
0.42
|
|
hacker
→
CapableOf
→
steal intellectual property
|
0.42
|
|
hacker
→
CapableOf
→
see opportunity
|
0.41
|
|
hacker
→
CapableOf
→
commit fraud
|
0.41
|
|
hacker
→
CapableOf
→
target individual
|
0.41
|
|
hacker
→
CapableOf
→
use brute force attack
|
0.41
|
|
hacker
→
CapableOf
→
use flaw
|
0.41
|
|
hacker
→
CapableOf
→
use artificial intelligence
|
0.41
|
|
hacker
→
CapableOf
→
steal email addresses
|
0.41
|
|
hacker
→
CapableOf
→
phishe attack
|
0.41
|
|
hacker
→
CapableOf
→
sell datum
|
0.41
|
|
hacker
→
CapableOf
→
take the money
|
0.41
|
|
hacker
→
CapableOf
→
impersonate user
|
0.41
|
|
hacker
→
CapableOf
→
inject malicious code
|
0.41
|
|
hacker
→
CapableOf
→
use exploit
|
0.41
|
|
hacker
→
CapableOf
→
obtain personal information
|
0.41
|
|
hacker
→
CapableOf
→
use social engineering
|
0.41
|
|
hacker
→
CapableOf
→
cast wide net
|
0.41
|
|
hacker
→
CapableOf
→
turn their attention
|
0.41
|
|
hacker
→
CapableOf
→
look to steal datum
|
0.41
|
|
hacker
→
CapableOf
→
focus their efforts
|
0.40
|
|
hacker
→
CapableOf
→
seek information
|
0.40
|
|
hacker
→
CapableOf
→
break into computer
|
0.40
|
|
hacker
→
CapableOf
→
gain full access
|
0.40
|
|
hacker
→
CapableOf
→
target small businesses
|
0.40
|
|
hacker
→
CapableOf
→
share information
|
0.40
|
|
hacker
→
CapableOf
→
look for information
|
0.40
|
|
hacker
→
CapableOf
→
use bot
|
0.40
|
|
hacker
→
CapableOf
→
provide key
|
0.40
|
|
hacker
→
CapableOf
→
use shodan
|
0.40
|
|
hacker
→
CapableOf
→
create new malware
|
0.40
|
|
hacker
→
CapableOf
→
look for security flaws
|
0.40
|
|
hacker
→
CapableOf
→
target financial institutions
|
0.40
|
|
hacker
→
CapableOf
→
use ip addresses
|
0.40
|
|
hacker
→
CapableOf
→
break into computer systems
|
0.40
|
|
hacker
→
CapableOf
→
access confidential information
|
0.40
|
|
hacker
→
CapableOf
→
target healthcare organizations
|
0.40
|
|
hacker
→
CapableOf
→
use botnet
|
0.39
|
|
hacker
→
CapableOf
→
use spyware
|
0.39
|
|
hacker
→
CapableOf
→
launch cyber attacks
|
0.39
|
|
hacker
→
CapableOf
→
use trojan
|
0.39
|
|
hacker
→
CapableOf
→
sell the information
|
0.39
|
|
hacker
→
CapableOf
→
create malware
|
0.39
|
|
hacker
→
CapableOf
→
access the information
|
0.39
|
|
hacker
→
CapableOf
→
compromise system
|
0.39
|
|
hacker
→
CapableOf
→
refine their methods
|
0.39
|
|
hacker
→
CapableOf
→
steal fund
|
0.39
|
|
hacker
→
CapableOf
→
intercept datum
|
0.39
|
|
hacker
→
CapableOf
→
access site
|
0.39
|
|
hacker
→
CapableOf
→
offer their services
|
0.39
|
|
hacker
→
CapableOf
→
leave message
|
0.39
|
|
hacker
→
CapableOf
→
reset password
|
0.39
|
|
hacker
→
CapableOf
→
worm their way
|
0.39
|
|
hacker
→
CapableOf
→
target bank
|
0.39
|
|
hacker
→
CapableOf
→
change password
|
0.39
|
|
hacker
→
CapableOf
→
plead guilty
|
0.38
|
|
hacker
→
CapableOf
→
use email addresses
|
0.38
|
|
hacker
→
CapableOf
→
pose risk
|
0.38
|
|
hacker
→
CapableOf
→
try to steal sensitive informat…
|
0.38
|
|
hacker
→
CapableOf
→
exploit any vulnerability
|
0.38
|
|
hacker
→
CapableOf
→
up the ante
|
0.38
|
|
hacker
→
CapableOf
→
go by the handle
|
0.38
|
|
hacker
→
CapableOf
→
use attack
|
0.38
|
|
hacker
→
CapableOf
→
use email
|
0.38
|
|
hacker
→
CapableOf
→
try to guess password
|
0.38
|
|
hacker
→
CapableOf
→
attack website
|
0.38
|
|
hacker
→
CapableOf
→
use automated tools
|
0.38
|
|
hacker
→
CapableOf
→
use proxy
|
0.37
|
|
hacker
→
CapableOf
→
steal sensitive information
|
0.37
|
|
hacker
→
CapableOf
→
steal credit card numbers
|
0.37
|
|
hacker
→
CapableOf
→
access the vehicle
|
0.37
|
|
hacker
→
CapableOf
→
try to steal money
|
0.37
|
|
hacker
→
CapableOf
→
access information
|
0.37
|
|
hacker
→
CapableOf
→
steal social security numbers
|
0.37
|
|
hacker
→
CapableOf
→
look for credit card numbers
|
0.37
|
|
hacker
→
CapableOf
→
get good
|
0.37
|
|
hacker
→
CapableOf
→
try to exploit vulnerability
|
0.37
|
|
hacker
→
CapableOf
→
steal file
|
0.37
|
|
hacker
→
CapableOf
→
target large organizations
|
0.37
|
|
hacker
→
CapableOf
→
steal login credentials
|
0.37
|
|
hacker
→
CapableOf
→
access social security numbers
|
0.37
|
|
hacker
→
CapableOf
→
use automated scripts
|
0.37
|
|
hacker
→
CapableOf
→
go by the pseudonym
|
0.37
|
|
hacker
→
CapableOf
→
tell motherboard
|
0.37
|
|
hacker
→
CapableOf
→
hide their tracks
|
0.37
|
|
hacker
→
CapableOf
→
look to make money
|
0.37
|
|
hacker
→
CapableOf
→
target
|
0.37
|
|
hacker
→
CapableOf
→
try to get information
|
0.37
|
|
hacker
→
CapableOf
→
use special software
|
0.37
|
|
hacker
→
CapableOf
→
get lucky
|
0.37
|
|
hacker
→
CapableOf
→
steal personal data
|
0.37
|
|
hacker
→
CapableOf
→
pretend to be someone
|
0.37
|
|
hacker
→
CapableOf
→
use sql injection
|
0.37
|
|
hacker
→
CapableOf
→
break into account
|
0.37
|
|
hacker
→
CapableOf
→
hold data hostage
|
0.36
|
|
hacker
→
CapableOf
→
target government agencies
|
0.36
|
|
hacker
→
CapableOf
→
steal phone numbers
|
0.36
|
|
hacker
→
CapableOf
→
attempt to find vulnerable syst…
|
0.36
|
|
hacker
→
CapableOf
→
become more skilled
|
0.36
|
|
hacker
→
CapableOf
→
move
|
0.36
|
|
hacker
→
CapableOf
→
gain control
|
0.36
|
|
hacker
→
CapableOf
→
take the opportunity
|
0.36
|
|
hacker
→
CapableOf
→
steal username
|
0.36
|
|
hacker
→
CapableOf
→
be a computer user
|
0.36
|
|
hacker
→
CapableOf
→
do reconnaissance
|
0.36
|
|
hacker
→
CapableOf
→
shift their focus
|
0.36
|
|
hacker
→
CapableOf
→
use phishing
|
0.36
|
|
hacker
→
CapableOf
→
find hole
|
0.36
|
|
hacker
→
CapableOf
→
use virus
|
0.36
|
|
hacker
→
CapableOf
→
use sniffer
|
0.36
|
|
hacker
→
CapableOf
→
ask for password
|
0.36
|
|
hacker
→
CapableOf
→
manage to get their hands
|
0.36
|
|
hacker
→
CapableOf
→
release the source code
|
0.36
|
|
hacker
→
CapableOf
→
make money
|
0.36
|
|
hacker
→
CapableOf
→
threaten to publish datum
|
0.36
|
|
hacker
→
CapableOf
→
use sophisticated techniques
|
0.36
|
|
hacker
→
CapableOf
→
access email addresses
|
0.36
|
|
hacker
→
CapableOf
→
decipher password
|
0.35
|
|
hacker
→
CapableOf
→
work on behalf of north korea
|
0.35
|
|
hacker
→
CapableOf
→
use phishing email
|
0.35
|
|
hacker
→
CapableOf
→
use tactic
|
0.35
|
|
hacker
→
CapableOf
→
encrypt datum
|
0.35
|
|
hacker
→
CapableOf
→
execute code
|
0.35
|
|
hacker
→
CapableOf
→
get close
|
0.35
|
|
hacker
→
CapableOf
→
take note
|
0.35
|
|
hacker
→
CapableOf
→
create new accounts
|
0.35
|
|
hacker
→
CapableOf
→
run program
|
0.35
|
|
hacker
→
CapableOf
→
exploit the vulnerability
|
0.35
|
|
hacker
→
CapableOf
→
use access
|
0.35
|
|
hacker
→
CapableOf
→
target network
|
0.35
|
|
hacker
→
CapableOf
→
eavesdrop on conversation
|
0.35
|
|
hacker
→
CapableOf
→
target smb
|
0.35
|
|
hacker
→
CapableOf
→
look for easy targets
|
0.35
|
|
hacker
→
CapableOf
→
use automated software
|
0.35
|
|
hacker
→
CapableOf
→
breach system
|
0.35
|
|
hacker
→
CapableOf
→
target mobile devices
|
0.35
|
|
hacker
→
CapableOf
→
breach network
|
0.35
|
|
hacker
→
CapableOf
→
access the system
|
0.35
|
|
hacker
→
CapableOf
→
accessed business documents
|
0.35
|
|
hacker
→
CapableOf
→
become more advanced
|
0.35
|
|
hacker
→
CapableOf
→
continue to drop piece
|
0.35
|
|
hacker
→
CapableOf
→
gain root access
|
0.35
|
|
hacker
→
CapableOf
→
get all the data
|
0.35
|
|
hacker
→
CapableOf
→
make good
|
0.35
|
|
hacker
→
CapableOf
→
provide link
|
0.35
|
|
hacker
→
CapableOf
→
extort money
|
0.35
|
|
hacker
→
CapableOf
→
test their skills
|
0.35
|
|
hacker
→
CapableOf
→
send phishing emails
|
0.35
|
|
hacker
→
CapableOf
→
become adept
|
0.35
|
|
hacker
→
CapableOf
→
exploited vulnerability
|
0.35
|
|
hacker
→
CapableOf
→
move through the network
|
0.35
|
|
hacker
→
CapableOf
→
work for russia
|
0.35
|
|
hacker
→
CapableOf
→
hide malicious code
|
0.35
|
|
hacker
→
CapableOf
→
use encryption
|
0.35
|
|
hacker
→
CapableOf
→
use ddos attacks
|
0.35
|
|
hacker
→
CapableOf
→
hack website
|
0.35
|
|
hacker
→
CapableOf
→
access username
|
0.34
|
|
hacker
→
CapableOf
→
move datum
|
0.34
|
|
hacker
→
CapableOf
→
obtain login credentials
|
0.34
|
|
hacker
→
CapableOf
→
report bug
|
0.34
|
|
hacker
→
CapableOf
→
scan the network
|
0.34
|
|
hacker
→
CapableOf
→
send letter
|
0.34
|
|
hacker
→
CapableOf
→
use same tools
|
0.34
|
|
hacker
→
CapableOf
→
use their skills
|
0.34
|
|
hacker
→
CapableOf
→
attack system
|
0.34
|
|
hacker
→
CapableOf
→
converge on las vegas
|
0.34
|
|
hacker
→
CapableOf
→
spend their days
|
0.34
|
|
hacker
→
CapableOf
→
spam to other people
|
0.34
|
|
hacker
→
CapableOf
→
execute malicious code
|
0.34
|
|
hacker
→
CapableOf
→
access accounts
|
0.34
|
|
hacker
→
CapableOf
→
adapt their techniques
|
0.34
|
|
hacker
→
CapableOf
→
obtain valuable information
|
0.34
|
|
hacker
→
CapableOf
→
send file
|
0.34
|
|
hacker
→
CapableOf
→
engage in ip spoofing
|
0.34
|
|
hacker
→
CapableOf
→
exploit the flaw
|
0.34
|
|
hacker
→
CapableOf
→
change setting
|
0.34
|
|
hacker
→
CapableOf
→
use malicious software
|
0.34
|
|
hacker
→
CapableOf
→
access sensitive data
|
0.34
|
|
hacker
→
CapableOf
→
become savvier
|
0.34
|
|
hacker
→
CapableOf
→
find security flaws
|
0.34
|
|
hacker
→
CapableOf
→
get detail
|
0.34
|
|
hacker
→
CapableOf
→
read message
|
0.34
|
|
hacker
→
CapableOf
→
find server
|
0.34
|
|
hacker
→
CapableOf
→
find exploit
|
0.34
|
|
hacker
→
CapableOf
→
attack network
|
0.34
|
|
hacker
→
CapableOf
→
send spam
|
0.33
|
|
hacker
→
CapableOf
→
look for the path of least resi…
|
0.33
|
|
hacker
→
CapableOf
→
use connection
|
0.33
|
|
hacker
→
CapableOf
→
getting started
|
0.33
|
|
hacker
→
CapableOf
→
develop other malicious softwar…
|
0.33
|
|
hacker
→
CapableOf
→
access other accounts
|
0.33
|
|
hacker
→
CapableOf
→
access the software
|
0.33
|
|
hacker
→
CapableOf
→
create app
|
0.33
|
|
hacker
→
CapableOf
→
get the code
|
0.33
|
|
hacker
→
CapableOf
→
listen to call
|
0.33
|
|
hacker
→
CapableOf
→
use laptop
|
0.33
|
|
hacker
→
CapableOf
→
create botnet
|
0.33
|
|
hacker
→
CapableOf
→
target email
|
0.33
|
|
hacker
→
CapableOf
→
hack the network
|
0.33
|
|
hacker
→
CapableOf
→
use other methods
|
0.33
|
|
hacker
→
CapableOf
→
gain remote access
|
0.33
|
|
hacker
→
CapableOf
→
collect personal data
|
0.33
|
|
hacker
→
CapableOf
→
access file
|
0.33
|
|
hacker
→
CapableOf
→
use computer
|
0.33
|
|
hacker
→
CapableOf
→
get hold
|
0.33
|
|
hacker
→
CapableOf
→
listen
|
0.33
|
|
hacker
→
CapableOf
→
make profit
|
0.33
|
|
hacker
→
CapableOf
→
move to easier target
|
0.33
|
|
hacker
→
CapableOf
→
obtain other information
|
0.33
|
|
hacker
→
CapableOf
→
obtain usernames
|
0.33
|
|
hacker
→
CapableOf
→
sniff password
|
0.33
|
|
hacker
→
CapableOf
→
unlock file
|
0.33
|
|
hacker
→
CapableOf
→
use alia
|
0.33
|
|
hacker
→
CapableOf
→
view important data of the comp…
|
0.33
|
|
hacker
→
CapableOf
→
viewed account email addresses
|
0.33
|
|
hacker
→
CapableOf
→
pose as employee
|
0.33
|
|
hacker
→
CapableOf
→
target wordpress
|
0.33
|
|
hacker
→
CapableOf
→
use phishing attack
|
0.32
|
|
hacker
→
CapableOf
→
insert malicious code
|
0.32
|
|
hacker
→
CapableOf
→
scan website
|
0.32
|
|
hacker
→
CapableOf
→
penetrate the system
|
0.32
|
|
hacker
→
CapableOf
→
access credit card numbers
|
0.32
|
|
hacker
→
CapableOf
→
set up website
|
0.32
|
|
hacker
→
CapableOf
→
exploit a security flaw
|
0.32
|
|
hacker
→
CapableOf
→
convince user
|
0.32
|
|
hacker
→
CapableOf
→
engage in whaling
|
0.32
|
|
hacker
→
CapableOf
→
extend their reach
|
0.32
|
|
hacker
→
CapableOf
→
glean information
|
0.32
|
|
hacker
→
CapableOf
→
hijack connection
|
0.32
|
|
hacker
→
CapableOf
→
try password combinations
|
0.32
|
|
hacker
→
CapableOf
→
use legitimate credentials
|
0.32
|
|
hacker
→
CapableOf
→
use same password
|
0.32
|
|
hacker
→
CapableOf
→
steal customer data
|
0.32
|
|
hacker
→
CapableOf
→
exploit known vulnerabilities
|
0.32
|
|
hacker
→
CapableOf
→
make living
|
0.32
|
|
hacker
→
CapableOf
→
take over computer
|
0.32
|
|
hacker
→
CapableOf
→
encrypt file
|
0.32
|
|
hacker
→
CapableOf
→
use a variety of methods
|
0.32
|
|
hacker
→
CapableOf
→
steal other personal information
|
0.32
|
|
hacker
→
CapableOf
→
commit identity theft
|
0.32
|
|
hacker
→
CapableOf
→
install malicious software
|
0.32
|
|
hacker
→
CapableOf
→
obtain sensitive information
|
0.32
|
|
hacker
→
CapableOf
→
use social media
|
0.32
|
|
hacker
→
CapableOf
→
send fake email
|
0.32
|
|
hacker
→
CapableOf
→
collect datum
|
0.32
|
|
hacker
→
CapableOf
→
compromise server
|
0.32
|
|
hacker
→
CapableOf
→
read datum
|
0.32
|
|
hacker
→
CapableOf
→
access private information
|
0.31
|
|
hacker
→
CapableOf
→
steal their data
|
0.31
|
|
hacker
→
CapableOf
→
become more intelligent
|
0.31
|
|
hacker
→
CapableOf
→
cover the middle east
|
0.31
|
|
hacker
→
CapableOf
→
demand 100 bitcoins
|
0.31
|
|
hacker
→
CapableOf
→
develop new strategies
|
0.31
|
|
hacker
→
CapableOf
→
discover and exploit them
|
0.31
|
|
hacker
→
CapableOf
→
influence the outcome of electi…
|
0.31
|
|
hacker
→
CapableOf
→
leave trace
|
0.31
|
|
hacker
→
CapableOf
→
leveraged flaw
|
0.31
|
|
hacker
→
CapableOf
→
log into site
|
0.31
|
|
hacker
→
CapableOf
→
manipulate vote tallies
|
0.31
|
|
hacker
→
CapableOf
→
obtain login information
|
0.31
|
|
hacker
→
CapableOf
→
viewed subject lines of emails
|
0.31
|
|
hacker
→
CapableOf
→
attempt to gain entry
|
0.31
|
|
hacker
→
CapableOf
→
develop technique
|
0.31
|
|
hacker
→
CapableOf
→
launch ddos attacks
|
0.31
|
|
hacker
→
CapableOf
→
steal financial information
|
0.31
|
|
hacker
→
CapableOf
→
use personal information
|
0.31
|
|
hacker
→
CapableOf
→
use stolen credentials
|
0.31
|
|
hacker
→
CapableOf
→
go after low-hanging fruit
|
0.31
|
|
hacker
→
CapableOf
→
embed malware
|
0.31
|
|
hacker
→
CapableOf
→
use the network
|
0.31
|
|
hacker
→
CapableOf
→
intercept communication
|
0.31
|
|
hacker
→
CapableOf
→
obtain email addresses
|
0.31
|
|
hacker
→
CapableOf
→
access personal data
|
0.31
|
|
hacker
→
CapableOf
→
break into server
|
0.31
|
|
hacker
→
CapableOf
→
make a lot of money
|
0.31
|
|
hacker
→
CapableOf
→
break into website
|
0.31
|
|
hacker
→
CapableOf
→
access wide swath of information
|
0.31
|
|
hacker
→
CapableOf
→
come up with new tactics
|
0.31
|
|
hacker
→
CapableOf
→
gain valuable insight
|
0.31
|
|
hacker
→
CapableOf
→
get pins
|
0.31
|
|
hacker
→
CapableOf
→
hack paypal account
|
0.31
|
|
hacker
→
CapableOf
→
harvest username
|
0.31
|
|
hacker
→
CapableOf
→
look for device
|
0.31
|
|
hacker
→
CapableOf
→
obtain user names
|
0.31
|
|
hacker
→
CapableOf
→
trick the recipient
|
0.31
|
|
hacker
→
CapableOf
→
use search engines
|
0.31
|
|
hacker
→
CapableOf
→
steal credit card information
|
0.31
|
|
hacker
→
CapableOf
→
gain foothold
|
0.31
|
|
hacker
→
CapableOf
→
take control of a vehicle
|
0.31
|
|
hacker
→
CapableOf
→
take control of computers
|
0.31
|
|
hacker
→
CapableOf
→
find new vulnerabilities
|
0.31
|
|
hacker
→
CapableOf
→
make mistake
|
0.31
|
|
hacker
→
CapableOf
→
do same thing
|
0.31
|
|
hacker
→
CapableOf
→
exploit security vulnerabilities
|
0.30
|
|
hacker
→
CapableOf
→
work for russian government
|
0.30
|
|
hacker
→
CapableOf
→
choose their targets
|
0.30
|
|
hacker
→
CapableOf
→
go unnoticed
|
0.30
|
|
hacker
→
CapableOf
→
intercept information
|
0.30
|
|
hacker
→
CapableOf
→
penetrate our network security
|
0.30
|
|
hacker
→
CapableOf
→
phishe email
|
0.30
|
|
hacker
→
CapableOf
→
spoof email addresses
|
0.30
|
|
hacker
→
CapableOf
→
access employee data
|
0.30
|
|
hacker
→
CapableOf
→
accessed verification codes
|
0.30
|
|
hacker
→
CapableOf
→
attempt to breach system
|
0.30
|
|
hacker
→
CapableOf
→
become more determined
|
0.30
|
|
hacker
→
CapableOf
→
become more effective
|
0.30
|
|
hacker
→
CapableOf
→
communicate
|
0.30
|
|
hacker
→
CapableOf
→
demonstrate their ability
|
0.30
|
|
hacker
→
CapableOf
→
earned reputation
|
0.30
|
|
hacker
→
CapableOf
→
gain instant access
|
0.30
|
|
hacker
→
CapableOf
→
gain privilege
|
0.30
|
|
hacker
→
CapableOf
→
go by name
|
0.30
|
|
hacker
→
CapableOf
→
manipulate the code
|
0.30
|
|
hacker
→
CapableOf
→
plan attack
|
0.30
|
|
hacker
→
CapableOf
→
send the decryption key
|
0.30
|
|
hacker
→
CapableOf
→
stay
|
0.30
|
|
hacker
→
CapableOf
→
target other organizations
|
0.30
|
|
hacker
→
CapableOf
→
target voter registration syste…
|
0.30
|
|
hacker
→
CapableOf
→
tell zdnet
|
0.30
|
|
hacker
→
CapableOf
→
use antenna
|
0.30
|
|
hacker
→
CapableOf
→
use detail
|
0.30
|
|
hacker
→
CapableOf
→
use mimikatz
|
0.30
|
|
hacker
→
CapableOf
→
use swift
|
0.30
|
|
hacker
→
CapableOf
→
use the mirai malware
|
0.30
|
|
hacker
→
CapableOf
→
work on way
|
0.30
|
|
hacker
→
CapableOf
→
grow more sophisticated
|
0.30
|
|
hacker
→
CapableOf
→
modify the code
|
0.30
|
|
hacker
→
CapableOf
→
spy on user
|
0.30
|
|
hacker
→
CapableOf
→
steal bank account information
|
0.30
|
|
hacker
→
CapableOf
→
bypass two-factor authentication
|
0.30
|
|
hacker
→
CapableOf
→
use brute force
|
0.30
|
|
hacker
→
CapableOf
→
access sensitive information
|
0.30
|
|
hacker
→
CapableOf
→
demand a ransom payment
|
0.30
|
|
hacker
→
CapableOf
→
steal data
|
0.30
|
|
hacker
→
CapableOf
→
try to trick user
|
0.30
|
|
hacker
→
CapableOf
→
execute command
|
0.30
|
|
hacker
→
CapableOf
→
set their sights
|
0.30
|
|
hacker
→
CapableOf
→
steal encryption keys
|
0.30
|
|
hacker
→
CapableOf
→
take over account
|
0.30
|
|
hacker
→
CapableOf
→
target system
|
0.30
|
|
hacker
→
CapableOf
→
breach security
|
0.29
|
|
hacker
→
CapableOf
→
bypass security measures
|
0.29
|
|
hacker
→
CapableOf
→
use system
|
0.29
|
|
hacker
→
CapableOf
→
target iot devices
|
0.29
|
|
hacker
→
CapableOf
→
write code
|
0.29
|
|
hacker
→
CapableOf
→
exploit a security hole
|
0.29
|
|
hacker
→
CapableOf
→
steal proprietary information
|
0.29
|
|
hacker
→
CapableOf
→
access database
|
0.29
|
|
hacker
→
CapableOf
→
install virus
|
0.29
|
|
hacker
→
CapableOf
→
release datum
|
0.29
|
|
hacker
→
CapableOf
→
sell stolen data
|
0.29
|
|
hacker
→
CapableOf
→
ask for advice
|
0.29
|
|
hacker
→
CapableOf
→
break through defense
|
0.29
|
|
hacker
→
CapableOf
→
get a hold of it
|
0.29
|
|
hacker
→
CapableOf
→
roam
|
0.29
|
|
hacker
→
CapableOf
→
say in email
|
0.29
|
|
hacker
→
CapableOf
→
become more aggressive
|
0.29
|
|
hacker
→
CapableOf
→
break into a merchant’s website
|
0.29
|
|
hacker
→
CapableOf
→
compromise account
|
0.29
|
|
hacker
→
CapableOf
→
do serious damage
|
0.29
|
|
hacker
→
CapableOf
→
get into account
|
0.29
|
|
hacker
→
CapableOf
→
inject code
|
0.29
|
|
hacker
→
CapableOf
→
perform man-in-the-middle attac…
|
0.29
|
|
hacker
→
CapableOf
→
send datum
|
0.29
|
|
hacker
→
CapableOf
→
spread virus
|
0.29
|
|
hacker
→
CapableOf
→
breach
|
0.29
|
|
hacker
→
CapableOf
→
break into bank accounts
|
0.29
|
|
hacker
→
CapableOf
→
break into database
|
0.29
|
|
hacker
→
CapableOf
→
compromise network
|
0.29
|
|
hacker
→
CapableOf
→
create exploit
|
0.29
|
|
hacker
→
CapableOf
→
do more damage
|
0.29
|
|
hacker
→
CapableOf
→
get email addresses
|
0.29
|
|
hacker
→
CapableOf
→
intercept traffic
|
0.29
|
|
hacker
→
CapableOf
→
pay ransom
|
0.29
|
|
hacker
→
CapableOf
→
spread spam
|
0.29
|
|
hacker
→
CapableOf
→
use microphone
|
0.29
|
|
hacker
→
CapableOf
→
pretend to be bank
|
0.28
|
|
hacker
→
CapableOf
→
use different methods
|
0.28
|
|
hacker
→
CapableOf
→
use known vulnerabilities
|
0.28
|
|
hacker
→
CapableOf
→
access the account
|
0.28
|
|
hacker
→
CapableOf
→
take over device
|
0.28
|
|
hacker
→
CapableOf
→
attack computer
|
0.28
|
|
hacker
→
CapableOf
→
file fraudulent tax returns
|
0.28
|
|
hacker
→
CapableOf
→
intercept text messages
|
0.28
|
|
hacker
→
CapableOf
→
steal bank card numbers
|
0.28
|
|
hacker
→
CapableOf
→
steal encrypted passwords
|
0.28
|
|
hacker
→
CapableOf
→
use phone
|
0.28
|
|
hacker
→
CapableOf
→
access device
|
0.28
|
|
hacker
→
CapableOf
→
take down website
|
0.28
|
|
hacker
→
CapableOf
→
go to great lengths
|
0.28
|
|
hacker
→
CapableOf
→
become bolder
|
0.28
|
|
hacker
→
CapableOf
→
break into device
|
0.28
|
|
hacker
→
CapableOf
→
click on link
|
0.28
|
|
hacker
→
CapableOf
→
control device
|
0.28
|
|
hacker
→
CapableOf
→
gain direct access
|
0.28
|
|
hacker
→
CapableOf
→
hijack computer
|
0.28
|
|
hacker
→
CapableOf
→
take control of the system
|
0.28
|
|
hacker
→
CapableOf
→
use same technique
|
0.28
|
|
hacker
→
CapableOf
→
work around the clock
|
0.28
|
|
hacker
→
CapableOf
→
use xss
|
0.28
|
|
hacker
→
CapableOf
→
bring down entire network
|
0.28
|
|
hacker
→
CapableOf
→
access credit card information
|
0.28
|
|
hacker
→
CapableOf
→
attempt brute force attacks
|
0.28
|
|
hacker
→
CapableOf
→
do a lot of damage
|
0.28
|
|
hacker
→
CapableOf
→
release email
|
0.28
|
|
hacker
→
CapableOf
→
use bug
|
0.28
|
|
hacker
→
CapableOf
→
search the internet
|
0.28
|
|
hacker
→
CapableOf
→
use compromised accounts
|
0.28
|
|
hacker
→
CapableOf
→
steal credit cards
|
0.27
|
|
hacker
→
CapableOf
→
crack the encryption
|
0.27
|
|
hacker
→
CapableOf
→
instal malicious software
|
0.27
|
|
hacker
→
CapableOf
→
obtain expiry dates
|
0.27
|
|
hacker
→
CapableOf
→
release the information
|
0.27
|
|
hacker
→
CapableOf
→
steal millions of dollars
|
0.27
|
|
hacker
→
CapableOf
→
steal source code
|
0.27
|
|
hacker
→
CapableOf
→
steal user information
|
0.27
|
|
hacker
→
CapableOf
→
work for foreign government
|
0.27
|
|
hacker
→
CapableOf
→
waste their time
|
0.27
|
|
hacker
→
CapableOf
→
access credit card
|
0.27
|
|
hacker
→
CapableOf
→
attack bank
|
0.27
|
|
hacker
→
CapableOf
→
become cleverer
|
0.27
|
|
hacker
→
CapableOf
→
compromise our confidential inf…
|
0.27
|
|
hacker
→
CapableOf
→
continue to find way
|
0.27
|
|
hacker
→
CapableOf
→
execute arbitrary code
|
0.27
|
|
hacker
→
CapableOf
→
impersonate someone
|
0.27
|
|
hacker
→
CapableOf
→
take control of devices
|
0.27
|
|
hacker
→
CapableOf
→
target social media
|
0.27
|
|
hacker
→
CapableOf
→
attack
|
0.27
|
|
hacker
→
CapableOf
→
commit crime
|
0.27
|
|
hacker
→
CapableOf
→
control brake
|
0.27
|
|
hacker
→
CapableOf
→
hijack account
|
0.27
|
|
hacker
→
CapableOf
→
hijack session
|
0.27
|
|
hacker
→
CapableOf
→
launch ransomware attack
|
0.27
|
|
hacker
→
CapableOf
→
manipulate the system
|
0.27
|
|
hacker
→
CapableOf
→
spend much time
|
0.27
|
|
hacker
→
CapableOf
→
steal critical data
|
0.27
|
|
hacker
→
CapableOf
→
steal private key
|
0.27
|
|
hacker
→
CapableOf
→
steal trade secrets
|
0.27
|
|
hacker
→
CapableOf
→
break the law
|
0.27
|
|
hacker
→
CapableOf
→
blackmail their victims
|
0.27
|
|
hacker
→
CapableOf
→
access customer information
|
0.26
|
|
hacker
→
CapableOf
→
accessed personal information
|
0.26
|
|
hacker
→
CapableOf
→
breach server
|
0.26
|
|
hacker
→
CapableOf
→
bypass the hardware barrier
|
0.26
|
|
hacker
→
CapableOf
→
get into website
|
0.26
|
|
hacker
→
CapableOf
→
steal patient data
|
0.26
|
|
hacker
→
CapableOf
→
take control of the server
|
0.26
|
|
hacker
→
CapableOf
→
accessed name
|
0.26
|
|
hacker
→
CapableOf
→
control the computer
|
0.26
|
|
hacker
→
CapableOf
→
create fake website
|
0.26
|
|
hacker
→
CapableOf
→
eavesdrop
|
0.26
|
|
hacker
→
CapableOf
→
extract sensitive data
|
0.26
|
|
hacker
→
CapableOf
→
listen in on conversation
|
0.26
|
|
hacker
→
CapableOf
→
obtain hashed passwords
|
0.26
|
|
hacker
→
CapableOf
→
read email
|
0.26
|
|
hacker
→
CapableOf
→
sell access
|
0.26
|
|
hacker
→
CapableOf
→
steal bank account numbers
|
0.26
|
|
hacker
→
CapableOf
→
steal cookie
|
0.26
|
|
hacker
→
CapableOf
→
create false sense of trust
|
0.26
|
|
hacker
→
CapableOf
→
use public wifi
|
0.26
|
|
hacker
→
CapableOf
→
create fake websites
|
0.26
|
|
hacker
→
CapableOf
→
attempt to gain unauthorized ac…
|
0.26
|
|
hacker
→
CapableOf
→
breach firewall
|
0.26
|
|
hacker
→
CapableOf
→
hijack website
|
0.26
|
|
hacker
→
CapableOf
→
install backdoor
|
0.26
|
|
hacker
→
CapableOf
→
look for security vulnerabiliti…
|
0.26
|
|
hacker
→
CapableOf
→
make phone calls
|
0.26
|
|
hacker
→
CapableOf
→
map network
|
0.26
|
|
hacker
→
CapableOf
→
phishe scam
|
0.26
|
|
hacker
→
CapableOf
→
send fraudulent messages
|
0.26
|
|
hacker
→
CapableOf
→
steal access tokens
|
0.26
|
|
hacker
→
CapableOf
→
steal bank accounts
|
0.26
|
|
hacker
→
CapableOf
→
steal key
|
0.26
|
|
hacker
→
CapableOf
→
take advantage of the flaw
|
0.26
|
|
hacker
→
CapableOf
→
take over control of their mach…
|
0.26
|
|
hacker
→
CapableOf
→
use sophisticated malware
|
0.26
|
|
hacker
→
CapableOf
→
use spear-phishing emails
|
0.26
|
|
hacker
→
CapableOf
→
use webcam
|
0.26
|
|
hacker
→
CapableOf
→
wait for right moment
|
0.26
|
|
hacker
→
CapableOf
→
work for chinese government
|
0.26
|
|
hacker
→
CapableOf
→
gain administrative access
|
0.26
|
|
hacker
→
CapableOf
→
use device
|
0.26
|
|
hacker
→
CapableOf
→
bypass firewall
|
0.25
|
|
hacker
→
CapableOf
→
compromise security
|
0.25
|
|
hacker
→
CapableOf
→
exfiltrate datum
|
0.25
|
|
hacker
→
CapableOf
→
hijack network
|
0.25
|
|
hacker
→
CapableOf
→
manage to steal password
|
0.25
|
|
hacker
→
CapableOf
→
misappropriate our confidential…
|
0.25
|
|
hacker
→
CapableOf
→
take over site
|
0.25
|
|
hacker
→
CapableOf
→
take over system
|
0.25
|
|
hacker
→
CapableOf
→
break in datum
|
0.25
|
|
hacker
→
CapableOf
→
create fake email
|
0.25
|
|
hacker
→
CapableOf
→
exploit datum
|
0.25
|
|
hacker
→
CapableOf
→
focus sites/archives/programs
|
0.25
|
|
hacker
→
CapableOf
→
force their way
|
0.25
|
|
hacker
→
CapableOf
→
hack account
|
0.25
|
|
hacker
→
CapableOf
→
install other malware
|
0.25
|
|
hacker
→
CapableOf
→
launch denial of service attacks
|
0.25
|
|
hacker
→
CapableOf
→
launch their attacks
|
0.25
|
|
hacker
→
CapableOf
→
listen to phone calls
|
0.25
|
|
hacker
→
CapableOf
→
log keystroke
|
0.25
|
|
hacker
→
CapableOf
→
monitor datum
|
0.25
|
|
hacker
→
CapableOf
→
open the door
|
0.25
|
|
hacker
→
CapableOf
→
read text messages
|
0.25
|
|
hacker
→
CapableOf
→
steal login information
|
0.25
|
|
hacker
→
CapableOf
→
take control of the car
|
0.25
|
|
hacker
→
CapableOf
→
use spear-phishing
|
0.25
|
|
hacker
→
CapableOf
→
withdraw fund
|
0.25
|
|
hacker
→
CapableOf
→
do their homework
|
0.25
|
|
hacker
→
CapableOf
→
spend week
|
0.24
|
|
hacker
→
CapableOf
→
attempt to steal 1 billion
|
0.24
|
|
hacker
→
CapableOf
→
breach the site
|
0.24
|
|
hacker
→
CapableOf
→
break into email accounts
|
0.24
|
|
hacker
→
CapableOf
→
break into site
|
0.24
|
|
hacker
→
CapableOf
→
break the system
|
0.24
|
|
hacker
→
CapableOf
→
compromise medical devices
|
0.24
|
|
hacker
→
CapableOf
→
contact the company
|
0.24
|
|
hacker
→
CapableOf
→
exploit network
|
0.24
|
|
hacker
→
CapableOf
→
get into facebook
|
0.24
|
|
hacker
→
CapableOf
→
increase their efforts
|
0.24
|
|
hacker
→
CapableOf
→
install rootkit
|
0.24
|
|
hacker
→
CapableOf
→
lock computer
|
0.24
|
|
hacker
→
CapableOf
→
make off with phone numbers
|
0.24
|
|
hacker
→
CapableOf
→
obtain admin access
|
0.24
|
|
hacker
→
CapableOf
→
obtain classified information
|
0.24
|
|
hacker
→
CapableOf
→
obtain security codes
|
0.24
|
|
hacker
→
CapableOf
→
obtain sensitive financial info…
|
0.24
|
|
hacker
→
CapableOf
→
phishe website
|
0.24
|
|
hacker
→
CapableOf
→
pose as the ceo
|
0.24
|
|
hacker
→
CapableOf
→
sell password
|
0.24
|
|
hacker
→
CapableOf
→
send malicious emails
|
0.24
|
|
hacker
→
CapableOf
→
set up network
|
0.24
|
|
hacker
→
CapableOf
→
steal 1.5 terabytes of data
|
0.24
|
|
hacker
→
CapableOf
→
use the email account
|
0.24
|
|
hacker
→
CapableOf
→
enter the system
|
0.24
|
|
hacker
→
CapableOf
→
access corporate networks
|
0.24
|
|
hacker
→
CapableOf
→
access social security
|
0.24
|
|
hacker
→
CapableOf
→
attempt to interfere consensus-…
|
0.24
|
|
hacker
→
CapableOf
→
compromise car
|
0.24
|
|
hacker
→
CapableOf
→
concentrate their attacks
|
0.24
|
|
hacker
→
CapableOf
→
crack
|
0.24
|
|
hacker
→
CapableOf
→
create email addresses
|
0.24
|
|
hacker
→
CapableOf
→
decrypt file
|
0.24
|
|
hacker
→
CapableOf
→
demand 100,000
|
0.24
|
|
hacker
→
CapableOf
→
exploit the information
|
0.24
|
|
hacker
→
CapableOf
→
find back door
|
0.24
|
|
hacker
→
CapableOf
→
hack social media accounts
|
0.24
|
|
hacker
→
CapableOf
→
install malicious code
|
0.24
|
|
hacker
→
CapableOf
→
launch further attacks
|
0.24
|
|
hacker
→
CapableOf
→
make off with name
|
0.24
|
|
hacker
→
CapableOf
→
post tweet
|
0.24
|
|
hacker
→
CapableOf
→
pull off attack
|
0.24
|
|
hacker
→
CapableOf
→
reveal information
|
0.24
|
|
hacker
→
CapableOf
→
shut off power
|
0.24
|
|
hacker
→
CapableOf
→
siphon off money
|
0.24
|
|
hacker
→
CapableOf
→
spy
|
0.24
|
|
hacker
→
CapableOf
→
steal customer names
|
0.24
|
|
hacker
→
CapableOf
→
steal large amounts of data
|
0.24
|
|
hacker
→
CapableOf
→
steal million
|
0.24
|
|
hacker
→
CapableOf
→
take control of a jeep
|
0.24
|
|
hacker
→
CapableOf
→
target database
|
0.24
|
|
hacker
→
CapableOf
→
target the company
|
0.24
|
|
hacker
→
CapableOf
→
send fraudulent email
|
0.24
|
|
hacker
→
CapableOf
→
use keylogger
|
0.24
|
|
hacker
→
CapableOf
→
take control of it
|
0.23
|
|
hacker
→
CapableOf
→
hack the system
|
0.23
|
|
hacker
→
CapableOf
→
access datum
|
0.23
|
|
hacker
→
CapableOf
→
access names
|
0.23
|
|
hacker
→
CapableOf
→
break into company
|
0.23
|
|
hacker
→
CapableOf
→
break into voting machines
|
0.23
|
|
hacker
→
CapableOf
→
break the code
|
0.23
|
|
hacker
→
CapableOf
→
buy stolen data
|
0.23
|
|
hacker
→
CapableOf
→
create fake login page
|
0.23
|
|
hacker
→
CapableOf
→
download datum
|
0.23
|
|
hacker
→
CapableOf
→
exploit a software vulnerability
|
0.23
|
|
hacker
→
CapableOf
→
find breach
|
0.23
|
|
hacker
→
CapableOf
→
get one password
|
0.23
|
|
hacker
→
CapableOf
→
leave note
|
0.23
|
|
hacker
→
CapableOf
→
lock file
|
0.23
|
|
hacker
→
CapableOf
→
pose as colleague
|
0.23
|
|
hacker
→
CapableOf
→
put datum
|
0.23
|
|
hacker
→
CapableOf
→
send fake e
|
0.23
|
|
hacker
→
CapableOf
→
share knowledge
|
0.23
|
|
hacker
→
CapableOf
→
shut down the internet
|
0.23
|
|
hacker
→
CapableOf
→
shut down website
|
0.23
|
|
hacker
→
CapableOf
→
sneak malware
|
0.23
|
|
hacker
→
CapableOf
→
steal the car
|
0.23
|
|
hacker
→
CapableOf
→
take control of them
|
0.23
|
|
hacker
→
CapableOf
→
take over network
|
0.23
|
|
hacker
→
CapableOf
→
target law firms
|
0.23
|
|
hacker
→
CapableOf
→
work for iran
|
0.23
|
|
hacker
→
CapableOf
→
crack the code
|
0.23
|
|
hacker
→
CapableOf
→
pose as friend
|
0.23
|
|
hacker
→
CapableOf
→
put virus
|
0.23
|
|
hacker
→
CapableOf
→
access bank details
|
0.23
|
|
hacker
→
CapableOf
→
access text messages
|
0.23
|
|
hacker
→
CapableOf
→
access the company’s network
|
0.23
|
|
hacker
→
CapableOf
→
accessed customer names
|
0.23
|
|
hacker
→
CapableOf
→
attack individual
|
0.23
|
|
hacker
→
CapableOf
→
breach the device
|
0.23
|
|
hacker
→
CapableOf
→
compromise smartphone
|
0.23
|
|
hacker
→
CapableOf
→
control car
|
0.23
|
|
hacker
→
CapableOf
→
control the malware
|
0.23
|
|
hacker
→
CapableOf
→
create fake accounts
|
0.23
|
|
hacker
→
CapableOf
→
demand millions of dollars
|
0.23
|
|
hacker
→
CapableOf
→
disable brake
|
0.23
|
|
hacker
→
CapableOf
→
find security loopholes
|
0.23
|
|
hacker
→
CapableOf
→
grow in number
|
0.23
|
|
hacker
→
CapableOf
→
hijack device
|
0.23
|
|
hacker
→
CapableOf
→
install malware
|
0.23
|
|
hacker
→
CapableOf
→
know the default passwords
|
0.23
|
|
hacker
→
CapableOf
→
log into the system
|
0.23
|
|
hacker
→
CapableOf
→
lose interest
|
0.23
|
|
hacker
→
CapableOf
→
make off with password
|
0.23
|
|
hacker
→
CapableOf
→
make use of it
|
0.23
|
|
hacker
→
CapableOf
→
manage to steal username
|
0.23
|
|
hacker
→
CapableOf
→
pose as legitimate companies
|
0.23
|
|
hacker
→
CapableOf
→
run rampant
|
0.23
|
|
hacker
→
CapableOf
→
scour the internet
|
0.23
|
|
hacker
→
CapableOf
→
send malicious links
|
0.23
|
|
hacker
→
CapableOf
→
set up fake network
|
0.23
|
|
hacker
→
CapableOf
→
spend more time
|
0.23
|
|
hacker
→
CapableOf
→
spread malicious code
|
0.23
|
|
hacker
→
CapableOf
→
steal access
|
0.23
|
|
hacker
→
CapableOf
→
steal the code
|
0.23
|
|
hacker
→
CapableOf
→
target industry
|
0.23
|
|
hacker
→
CapableOf
→
target power grids
|
0.23
|
|
hacker
→
CapableOf
→
try to access account
|
0.23
|
|
hacker
→
CapableOf
→
use heartbleed
|
0.23
|
|
hacker
→
CapableOf
→
use machine
|
0.23
|
|
hacker
→
CapableOf
→
use rat
|
0.23
|
|
hacker
→
CapableOf
→
use sms
|
0.23
|
|
hacker
→
CapableOf
→
use trojan horses
|
0.23
|
|
hacker
→
CapableOf
→
improve security
|
0.23
|
|
hacker
→
CapableOf
→
design their malware
|
0.22
|
|
hacker
→
CapableOf
→
lie in wait
|
0.22
|
|
hacker
→
CapableOf
→
use service
|
0.22
|
|
hacker
→
CapableOf
→
access business
|
0.22
|
|
hacker
→
CapableOf
→
attack other computers
|
0.22
|
|
hacker
→
CapableOf
→
break into a product owner’s we…
|
0.22
|
|
hacker
→
CapableOf
→
commit credit card fraud
|
0.22
|
|
hacker
→
CapableOf
→
compromise the website
|
0.22
|
|
hacker
→
CapableOf
→
control infected computers
|
0.22
|
|
hacker
→
CapableOf
→
control system
|
0.22
|
|
hacker
→
CapableOf
→
cost a lot of money
|
0.22
|
|
hacker
→
CapableOf
→
create fake profile
|
0.22
|
|
hacker
→
CapableOf
→
create ransomware
|
0.22
|
|
hacker
→
CapableOf
→
deploy other malicious software…
|
0.22
|
|
hacker
→
CapableOf
→
destroy stolen data
|
0.22
|
|
hacker
→
CapableOf
→
engage in cyber assaults
|
0.22
|
|
hacker
→
CapableOf
→
exploit site
|
0.22
|
|
hacker
→
CapableOf
→
exploit vulnerabilities
|
0.22
|
|
hacker
→
CapableOf
→
expose sensitive information
|
0.22
|
|
hacker
→
CapableOf
→
flood website
|
0.22
|
|
hacker
→
CapableOf
→
focus on new type of heist
|
0.22
|
|
hacker
→
CapableOf
→
go undetected
|
0.22
|
|
hacker
→
CapableOf
→
hack the website
|
0.22
|
|
hacker
→
CapableOf
→
hide their identity
|
0.22
|
|
hacker
→
CapableOf
→
impersonate website
|
0.22
|
|
hacker
→
CapableOf
→
install adware
|
0.22
|
|
hacker
→
CapableOf
→
intercept sensitive information
|
0.22
|
|
hacker
→
CapableOf
→
leak document
|
0.22
|
|
hacker
→
CapableOf
→
leak the script
|
0.22
|
|
hacker
→
CapableOf
→
manage to steal datum
|
0.22
|
|
hacker
→
CapableOf
→
misspell foundation
|
0.22
|
|
hacker
→
CapableOf
→
overload the system
|
0.22
|
|
hacker
→
CapableOf
→
phishe to deploy malware
|
0.22
|
|
hacker
→
CapableOf
→
release social security numbers
|
0.22
|
|
hacker
→
CapableOf
→
scan for vulnerability
|
0.22
|
|
hacker
→
CapableOf
→
steal medical records
|
0.22
|
|
hacker
→
CapableOf
→
steal our identity
|
0.22
|
|
hacker
→
CapableOf
→
steal passwords
|
0.22
|
|
hacker
→
CapableOf
→
take down twitter
|
0.22
|
|
hacker
→
CapableOf
→
take over thermostat
|
0.22
|
|
hacker
→
CapableOf
→
target contractor
|
0.22
|
|
hacker
→
CapableOf
→
target critical infrastructure
|
0.22
|
|
hacker
→
CapableOf
→
target sony
|
0.22
|
|
hacker
→
CapableOf
→
target specific individuals
|
0.22
|
|
hacker
→
CapableOf
→
view file
|
0.22
|
|
hacker
→
CapableOf
→
use iot devices
|
0.22
|
|
hacker
→
CapableOf
→
affect network
|
0.21
|
|
hacker
→
CapableOf
→
alter the communication
|
0.21
|
|
hacker
→
CapableOf
→
become more brazen
|
0.21
|
|
hacker
→
CapableOf
→
build the internet
|
0.21
|
|
hacker
→
CapableOf
→
compromise systems
|
0.21
|
|
hacker
→
CapableOf
→
connect to the car
|
0.21
|
|
hacker
→
CapableOf
→
demand 17,000
|
0.21
|
|
hacker
→
CapableOf
→
demand 300
|
0.21
|
|
hacker
→
CapableOf
→
exploit to gain access
|
0.21
|
|
hacker
→
CapableOf
→
flood the server
|
0.21
|
|
hacker
→
CapableOf
→
gather intelligence
|
0.21
|
|
hacker
→
CapableOf
→
get credit cards
|
0.21
|
|
hacker
→
CapableOf
→
get more information
|
0.21
|
|
hacker
→
CapableOf
→
grab private correspondence
|
0.21
|
|
hacker
→
CapableOf
→
hijack stored data
|
0.21
|
|
hacker
→
CapableOf
→
implant malicious software
|
0.21
|
|
hacker
→
CapableOf
→
infiltrate organization
|
0.21
|
|
hacker
→
CapableOf
→
launch campaign
|
0.21
|
|
hacker
→
CapableOf
→
launch distributed denial of se…
|
0.21
|
|
hacker
→
CapableOf
→
leave a ransom note
|
0.21
|
|
hacker
→
CapableOf
→
lock down datum
|
0.21
|
|
hacker
→
CapableOf
→
look for financial gain
|
0.21
|
|
hacker
→
CapableOf
→
look to interrupt communication
|
0.21
|
|
hacker
→
CapableOf
→
make million
|
0.21
|
|
hacker
→
CapableOf
→
make off with birth dates
|
0.21
|
|
hacker
→
CapableOf
→
make the unix operating system
|
0.21
|
|
hacker
→
CapableOf
→
make the world wide web work
|
0.21
|
|
hacker
→
CapableOf
→
manage to install malware
|
0.21
|
|
hacker
→
CapableOf
→
offer to sell access
|
0.21
|
|
hacker
→
CapableOf
→
plant virus
|
0.21
|
|
hacker
→
CapableOf
→
pretend to be vendor
|
0.21
|
|
hacker
→
CapableOf
→
publish name
|
0.21
|
|
hacker
→
CapableOf
→
release credit card numbers
|
0.21
|
|
hacker
→
CapableOf
→
remain under the radar
|
0.21
|
|
hacker
→
CapableOf
→
send malicious code
|
0.21
|
|
hacker
→
CapableOf
→
send money
|
0.21
|
|
hacker
→
CapableOf
→
show sign
|
0.21
|
|
hacker
→
CapableOf
→
shut down system
|
0.21
|
|
hacker
→
CapableOf
→
steal corporate passwords
|
0.21
|
|
hacker
→
CapableOf
→
take down site
|
0.21
|
|
hacker
→
CapableOf
→
target intellectual property
|
0.21
|
|
hacker
→
CapableOf
→
target the united nations
|
0.21
|
|
hacker
→
CapableOf
→
threaten the company
|
0.21
|
|
hacker
→
CapableOf
→
threaten to release more inform…
|
0.21
|
|
hacker
→
CapableOf
→
turn off the engine
|
0.21
|
|
hacker
→
CapableOf
→
unlock encrypted data
|
0.21
|
|
hacker
→
CapableOf
→
use a zero-day exploit
|
0.21
|
|
hacker
→
CapableOf
→
use login
|
0.21
|
|
hacker
→
CapableOf
→
use security cameras
|
0.21
|
|
hacker
→
CapableOf
→
use similar technique
|
0.21
|
|
hacker
→
CapableOf
→
use simple trick
|
0.21
|
|
hacker
→
CapableOf
→
use text messages
|
0.21
|
|
hacker
→
CapableOf
→
use twitter
|
0.21
|
|
hacker
→
CapableOf
→
register domain
|
0.21
|
|
hacker
→
CapableOf
→
infiltrate the system
|
0.21
|
|
hacker
→
CapableOf
→
call employee
|
0.21
|
|
hacker
→
CapableOf
→
access bank accounts
|
0.20
|
|
hacker
→
CapableOf
→
attack organization
|
0.20
|
|
hacker
→
CapableOf
→
break into other computers
|
0.20
|
|
hacker
→
CapableOf
→
capture information
|
0.20
|
|
hacker
→
CapableOf
→
engage data exfiltration activi…
|
0.20
|
|
hacker
→
CapableOf
→
hold file
|
0.20
|
|
hacker
→
CapableOf
→
launch malware
|
0.20
|
|
hacker
→
CapableOf
→
launch massive attack
|
0.20
|
|
hacker
→
CapableOf
→
look for new vulnerabilities
|
0.20
|
|
hacker
→
CapableOf
→
make off with personal informat…
|
0.20
|
|
hacker
→
CapableOf
→
penetrated the company’s comput…
|
0.20
|
|
hacker
→
CapableOf
→
tap
|
0.20
|
|
hacker
→
CapableOf
→
trick the system
|
0.20
|
|
hacker
→
CapableOf
→
hack router
|
0.20
|
|
hacker
→
CapableOf
→
use packet sniffers
|
0.19
|
|
hacker
→
CapableOf
→
access email
|
0.18
|
|
hacker
→
CapableOf
→
steal our data
|
0.18
|
|
hacker
→
CapableOf
→
capture keystroke
|
0.17
|
|
hacker
→
CapableOf
→
penetrate
|
0.11
|
|
hacker
→
CapableOf
→
tamper
|
0.09
|
|
hacker
→
CapableOf
→
target specific businesses
|
0.08
|
|
hacker
→
CapableOf
→
corrupt datum
|
0.08
|
|
hacker
→
CapableOf
→
influence election
|
0.07
|
|
hacker
→
CapableOf
→
misuse the information
|
0.07
|
|