CAPEC-158: Sniffing Network Traffic

Detailed Draft 严重程度: Medium

CAPEC版本: 3.9

更新日期: 2023-01-24

攻击模式描述

In this attack pattern, the adversary monitors network traffic between nodes of a public or multicast network in an attempt to capture sensitive information at the protocol level. Network sniffing applications can reveal TCP/IP, DNS, Ethernet, and other low-level network communication information. The adversary takes a passive role in this attack pattern and simply observes and analyzes the traffic. The adversary may precipitate or indirectly influence the content of the observed transaction, but is never the intended recipient of the target information.

前提条件

  • The target must be communicating on a network protocol visible by a network sniffing application.
  • The adversary must obtain a logical position on the network from intercepting target network traffic is possible. Depending on the network topology, traffic sniffing may be simple or challenging. If both the target sender and target recipient are members of a single subnet, the adversary must also be on that subnet in order to see their traffic communication.

所需技能

Low Adversaries can obtain and set up open-source network sniffing tools easily.

所需资源

  • A tool with the capability of presenting network communication traffic (e.g., Wireshark, tcpdump, Cain and Abel, etc.).

后果影响

影响范围: Confidentiality

技术影响: Read Data

缓解措施

Obfuscate network traffic through encryption to prevent its readability by network sniffers.

Employ appropriate levels of segmentation to your network in accordance with best practices.

分类映射

分类名称 条目ID 条目名称
ATTACK 1040 Network Sniffing
ATTACK 1111 Multi-Factor Authentication Interception
关键信息

CAPEC ID: CAPEC-158

抽象级别: Detailed

状态: Draft

典型严重程度: Medium

相关攻击模式
相关CWE弱点