CAPEC-117: Interception

Interception

状态:Stable

Typical_Severify: Medium

攻击可能性:Low

描述

An adversary monitors data streams to or from the target for information gathering purposes. This attack may be undertaken to solely gather sensitive information or to support a further attack against the target. This attack pattern can involve sniffing network traffic as well as other types of data streams (e.g. radio). The adversary can attempt to initiate the establishment of a data stream or passively observe the communications as they unfold. In all variants of this attack, the adversary is not the intended recipient of the data stream. In contrast to other means of gathering information (e.g., targeting data leaks), the adversary must actively position himself so as to observe explicit data channels (e.g. network traffic) and read the content. However, this attack differs from a Man-In-the-Middle (MITM) attack, as the adversary does not alter the content of the communications nor forward data to the intended recipient.

相关攻击模式

ParentOf: CAPEC-157 | Sniffing Attacks

ParentOf: CAPEC-499 | Intent Intercept

ParentOf: CAPEC-651 | Eavesdropping

前置条件

The target must transmit data over a medium that is accessible to the adversary.

所需资源

The adversary must have the necessary technology to intercept information passing between the nodes of a network. For TCP/IP, the capability to run tcpdump, ethereal, etc. can be useful. Depending upon the data being targeted the technological requirements will change.

后果

Scope Impact Likelihood
C o n f i d e n t i a l i t y Read Data

缓解措施

Leverage encryption to encode the transmission of data thus making it accessible only to authorized parties.

实例

相关CWE

319 | 敏感数据的明文传输

内容历史记录

提交

2014-06-23 | CAPEC Content Team | The MITRE Corporation

修改

2017-05-01 | CAPEC Content Team | The MITRE Corporation

Updated Activation_Zone, Attack_Motivation-Consequences, Attack_Prerequisites, Description Summary, Injection_Vector, Payload, Payload_Activation_Impact, Related_Weaknesses, Solutions_and_Mitigations, Typical_Likelihood_of_Exploit

2018-07-31 | CAPEC Content Team | The MITRE Corporation

Updated Attack_Prerequisites, Description Summary, Resources_Required

2019-04-04 | CAPEC Content Team | The MITRE Corporation

Updated Related_Weaknesses

2019-09-30 | CAPEC Content Team | The MITRE Corporation

Updated Description, Related_Weaknesses