Dark Mode
Capec-616 Detail
Establish Rogue Location
Standard Social Engineering Supply Chain Communications Software Hardware Likelihood: Medium Typical Severity: Medium
Parents: 154
Children: 505 611 615 617 630 631 632 667 695
Threats: T98 T103
An adversary provides a malicious version of a resource at a location that is similar to the expected location of a legitimate resource. After establishing the rogue location, the adversary waits for a victim to visit the location and access the malicious resource.
Not present
| External ID | Source | Link | Description |
|---|---|---|---|
| CAPEC-616 | capec | https://capec.mitre.org/data/definitions/616.html | |
| CWE-200 | cwe | http://cwe.mitre.org/data/definitions/200.html | |
| T1036.005 | ATTACK | https://attack.mitre.org/wiki/Technique/T1036/005 | Masquerading: Match Legitimate Name or Location |
Not present
- A resource is expected to available to the user.
Not present
| Low |
|---|
| Adversaries can often purchase low-cost technology to implement rogue access points. |
| Integrity | Confidentiality |
|---|---|
| Other (Successful attacks of this nature can result in a wide variety of consequences and negatively impact confidentiality and integrity based on the adversary's subsequent actions.) | Other (Successful attacks of this nature can result in a wide variety of consequences and negatively impact confidentiality and integrity based on the adversary's subsequent actions.) |
Not present