Dark Mode

Settings

Capec-158 Detail

Sniffing Network Traffic

Detailed Communications Software Typical Severity: Medium

Parents: 157

Threats: T60 T65 T98 T270 T277 T291 T340 T383 T396

Tools: 14

Description

In this attack pattern, the adversary monitors network traffic between nodes of a public or multicast network in an attempt to capture sensitive information at the protocol level. Network sniffing applications can reveal TCP/IP, DNS, Ethernet, and other low-level network communication information. The adversary takes a passive role in this attack pattern and simply observes and analyzes the traffic. The adversary may precipitate or indirectly influence the content of the observed transaction, but is never the intended recipient of the target information.

Not present

External ID Source Link Description
CAPEC-158 capec https://capec.mitre.org/data/definitions/158.html
CWE-311 cwe http://cwe.mitre.org/data/definitions/311.html
T1040 ATTACK https://attack.mitre.org/wiki/Technique/T1040 Network Sniffing
T1111 ATTACK https://attack.mitre.org/wiki/Technique/T1111 Multi-Factor Authentication Interception

Not present

  1. The target must be communicating on a network protocol visible by a network sniffing application.
  2. The adversary must obtain a logical position on the network from intercepting target network traffic is possible. Depending on the network topology, traffic sniffing may be simple or challenging. If both the target sender and target recipient are members of a single subnet, the adversary must also be on that subnet in order to see their traffic communication.
  1. A tool with the capability of presenting network communication traffic (e.g., Wireshark, tcpdump, Cain and Abel, etc.).
Low
Adversaries can obtain and set up open-source network sniffing tools easily.
Confidentiality
Read Data

Not present