Dark Mode
Capec-117 Detail
Interception
Meta Communications Software Physical Security Likelihood: Low Typical Severity: Medium
Children: 157 499 651
Threats: T60 T65 T72 T98 T270 T277 T280 T291 T293 T340 T383 T386 T396 T399
Tools: 12 13 14
An adversary monitors data streams to or from the target for information gathering purposes. This attack may be undertaken to solely gather sensitive information or to support a further attack against the target. This attack pattern can involve sniffing network traffic as well as other types of data streams (e.g. radio). The adversary can attempt to initiate the establishment of a data stream or passively observe the communications as they unfold. In all variants of this attack, the adversary is not the intended recipient of the data stream. In contrast to other means of gathering information (e.g., targeting data leaks), the adversary must actively position themself so as to observe explicit data channels (e.g. network traffic) and read the content. However, this attack differs from a Adversary-In-the-Middle (CAPEC-94) attack, as the adversary does not alter the content of the communications nor forward data to the intended recipient.
Not present
| External ID | Source | Link | Description |
|---|---|---|---|
| CAPEC-117 | capec | https://capec.mitre.org/data/definitions/117.html | |
| CWE-319 | cwe | http://cwe.mitre.org/data/definitions/319.html |
Not present
- The target must transmit data over a medium that is accessible to the adversary.
- The adversary must have the necessary technology to intercept information passing between the nodes of a network. For TCP/IP, the capability to run tcpdump, ethereal, etc. can be useful. Depending upon the data being targeted the technological requirements will change.
Not present
| Confidentiality |
|---|
| Read Data |
Not present