Dark Mode
Capec-65 Detail
Sniff Application Code
Detailed Communications Software Likelihood: Low Typical Severity: High
Parents: 157
Threats: T60 T65 T98 T270 T277 T291 T340 T383 T396
An adversary passively sniffs network communications and captures application code bound for an authorized client. Once obtained, they can use it as-is, or through reverse-engineering glean sensitive information or exploit the trust relationship between the client and server. Such code may belong to a dynamic update to the client, a patch being applied to a client component or any such interaction where the client is authorized to communicate with the server.
Not present
| External ID | Source | Link | Description |
|---|---|---|---|
| CAPEC-65 | capec | https://capec.mitre.org/data/definitions/65.html | |
| CWE-319 | cwe | http://cwe.mitre.org/data/definitions/319.html | |
| CWE-311 | cwe | http://cwe.mitre.org/data/definitions/311.html | |
| CWE-318 | cwe | http://cwe.mitre.org/data/definitions/318.html | |
| CWE-693 | cwe | http://cwe.mitre.org/data/definitions/693.html | |
| T1040 | ATTACK | https://attack.mitre.org/wiki/Technique/T1040 | Network Sniffing |
Explore
-
Set up a sniffer: The adversary sets up a sniffer in the path between the server and the client and watches the traffic.
| Techniques |
|---|
| The adversary sets up a sniffer in the path between the server and the client. |
Exploit
-
[Capturing Application Code Bound During Patching]adversary knows that the computer/OS/application can request new applications to install, or it periodically checks for an available update. The adversary loads the sniffer set up during Explore phase, and extracts the application code from subsequent communication. The adversary then proceeds to reverse engineer the captured code.
| Techniques |
|---|
| adversary loads the sniffer to capture the application code bound during a dynamic update. |
| The adversary proceeds to reverse engineer the captured code. |
- The attacker must have the ability to place themself in the communication path between the client and server.
- The targeted application must receive some application code from the server; for example, dynamic updates, patches, applets or scripts.
- The attacker must be able to employ a sniffer on the network without being detected.
- The Attacker needs the ability to capture communications between the client being updated and the server providing the update. In the case that encryption obscures client/server communication the attacker will either need to lift key material from the client.
| Medium |
|---|
| The attacker needs to setup a sniffer for a sufficient period of time so as to capture meaningful quantities of code. The presence of the sniffer should not be detected on the network. Also if the attacker plans to employ an adversary-in-the-middle attack (CAPEC-94), the client or server must not realize this. Finally, the attacker needs to regenerate source code from binary code if the need be. |
| Authorization | Access Control | Confidentiality |
|---|---|---|
| Gain Privileges | Gain Privileges | Read Data |
| Gain Privileges |
- Attacker receives notification that the computer/OS/application has an available update, loads a network sniffing tool, and extracts update data from subsequent communication. The attacker then proceeds to reverse engineer the captured stream to gain sensitive information, such as encryption keys, validation algorithms, applications patches, etc..
- Plain code, such as applets or JavaScript, is also part of the executing application. If such code is transmitted unprotected, the attacker can capture the code and possibly reverse engineer it to gain sensitive information, such as encryption keys, validation algorithms and such.