Dark Mode
Capec-612 Detail
WiFi MAC Address Tracking
Detailed Communications Software Typical Severity: Low
Parents: 292
Threats: T60 T65 T80 T288 T291 T334 T392 T407
In this attack scenario, the attacker passively listens for WiFi messages and logs the associated Media Access Control (MAC) addresses. These addresses are intended to be unique to each wireless device (although they can be configured and changed by software). Once the attacker is able to associate a MAC address with a particular user or set of users (for example, when attending a public event), the attacker can then scan for that MAC address to track that user in the future.
Not present
| External ID | Source | Link | Description |
|---|---|---|---|
| CAPEC-612 | capec | https://capec.mitre.org/data/definitions/612.html | |
| CWE-201 | cwe | http://cwe.mitre.org/data/definitions/201.html | |
| CWE-300 | cwe | http://cwe.mitre.org/data/definitions/300.html |
Not present
- None
Not present
| Low |
|---|
| Open source and commercial software tools are available and several commercial advertising companies routinely set up tools to collect and monitor MAC addresses. |
Not present
Not present