Dark Mode
Capec-157 Detail
Sniffing Attacks
Standard Communications Software Typical Severity: Medium
Parents: 117
Children: 31 57 65 158 609
Threats: T60 T65 T98 T270 T277 T291 T340 T383 T396
Tools: 14
Not present
| External ID | Source | Link | Description |
|---|---|---|---|
| CAPEC-157 | capec | https://capec.mitre.org/data/definitions/157.html | |
| CWE-311 | cwe | http://cwe.mitre.org/data/definitions/311.html |
Explore
-
Determine Communication Mechanism: The adversary determines the nature and mechanism of communication between two components, looking for opportunities to exploit.
| Techniques |
|---|
| Look for application documentation that might describe a communication mechanism used by a target. |
Experiment
-
Position In Between Targets: The adversary positions themselves somewhere in the middle of the two components. If the communication is encrypted, the adversary will need to act as a proxy and route traffic between the components, exploiting a flaw in the encryption mechanism. Otherwise, the adversary can just observe the communication at either end.
| Techniques |
|---|
| Use Wireshark or some other packet capturing tool to capture traffic on a network. |
| Install spyware on a client that will intercept outgoing packets and route them to their destination as well as route incoming packets back to the client. |
| Exploit a weakness in an encrypted communication mechanism to gain access to traffic. Look for outdated mechanisms such as SSL. |
Exploit
-
Listen to Communication: The adversary observes communication, but does not alter or block it. The adversary gains access to sensitive information and can potentially utilize this information in a malicious way.
- The target data stream must be transmitted on a medium to which the adversary has access.
- The adversary must be able to intercept the transmissions containing the data of interest. Depending on the medium of transmission and the path the data takes between the sender and recipient, the adversary may require special equipment and/or require that this equipment be placed in specific locations (e.g., a network sniffing tool)
Not present
| Confidentiality |
|---|
| Read Data |
Not present