Dark Mode

Settings

Capec-616 Detail

Establish Rogue Location

Standard Social Engineering Supply Chain Communications Software Hardware Likelihood: Medium Typical Severity: Medium

Parents: 154

Children: 505 611 615 617 630 631 632 667 695

Threats: T98 T103

Description

An adversary provides a malicious version of a resource at a location that is similar to the expected location of a legitimate resource. After establishing the rogue location, the adversary waits for a victim to visit the location and access the malicious resource.

Not present

External ID Source Link Description
CAPEC-616 capec https://capec.mitre.org/data/definitions/616.html
CWE-200 cwe http://cwe.mitre.org/data/definitions/200.html
T1036.005 ATTACK https://attack.mitre.org/wiki/Technique/T1036/005 Masquerading: Match Legitimate Name or Location

Not present

  1. A resource is expected to available to the user.

Not present

Low
Adversaries can often purchase low-cost technology to implement rogue access points.
Integrity Confidentiality
Other (Successful attacks of this nature can result in a wide variety of consequences and negatively impact confidentiality and integrity based on the adversary's subsequent actions.) Other (Successful attacks of this nature can result in a wide variety of consequences and negatively impact confidentiality and integrity based on the adversary's subsequent actions.)

Not present