Dark Mode

Settings

Capec-594 Detail

Traffic Injection

Meta Communications Software

Children: 595

Threats: T63 T64 T102 T276 T395

Description

An adversary injects traffic into the target's network connection. The adversary is therefore able to degrade or disrupt the connection, and potentially modify the content. This is not a flooding attack, as the adversary is not focusing on exhausting resources. Instead, the adversary is crafting a specific input to affect the system in a particular way.

Not present

External ID Source Link Description
CAPEC-594 capec https://capec.mitre.org/data/definitions/594.html
CWE-940 cwe http://cwe.mitre.org/data/definitions/940.html

Not present

  1. The target application must leverage an open communications channel.
  2. The channel on which the target communicates must be vulnerable to interception (e.g., adversary in the middle attack - CAPEC-94).
  1. A tool, such as a MITM Proxy, that is capable of generating and injecting custom inputs to be used in the attack.

Not present

Integrity Availability
Other (An adversary's injection of additional content into a communication channel negatively impacts the integrity of that channel.) Unreliable Execution (The injection of specific content into a connection can trigger a disruption in that communications channel, thereby denying availability of the service.)

Not present