CAPEC-94: Adversary in the Middle (AiTM)

Meta Stable 严重程度: Very High 攻击可能性: High

CAPEC版本: 3.9

更新日期: 2023-01-24

攻击模式描述

执行流程

步骤 1 Explore

[Determine Communication Mechanism] The adversary determines the nature and mechanism of communication between two components, looking for opportunities to exploit.

技术:
  • Perform a sniffing attack and observe communication to determine a communication protocol.
  • Look for application documentation that might describe a communication mechanism used by a target.
步骤 2 Experiment

[Position In Between Targets] The adversary inserts themself into the communication channel initially acting as a routing proxy between the two targeted components.

技术:
  • Install spyware on a client that will intercept outgoing packets and route them to their destination as well as route incoming packets back to the client.
  • Exploit a weakness in an encrypted communication mechanism to gain access to traffic. Look for outdated mechanisms such as SSL.
步骤 3 Exploit

[Use Intercepted Data Maliciously] The adversary observes, filters, or alters passed data of its choosing to gain access to sensitive information or to manipulate the actions of the two target components for their own purposes.

技术:
  • Prevent some messages from reaching their destination, causing a denial of service.

前提条件

  • There are two components communicating with each other.
  • An attacker is able to identify the nature and mechanism of communication between the two target components.
  • An attacker can eavesdrop on the communication between the target components.
  • Strong mutual authentication is not used between the two target components yielding opportunity for attacker interposition.
  • The communication occurs in clear (not encrypted) or with insufficient and spoofable encryption.

所需技能

Medium This attack can get sophisticated since the attack may use cryptography.

后果影响

影响范围: Integrity

技术影响: Modify Data

影响范围: Confidentiality Access Control Authorization

技术影响: Gain Privileges

影响范围: Confidentiality

技术影响: Read Data

缓解措施

Ensure Public Keys are signed by a Certificate Authority

Encrypt communications using cryptography (e.g., SSL/TLS)

Use Strong mutual authentication to always fully authenticate both ends of any communications channel.

Exchange public keys using a secure channel

分类映射

分类名称 条目ID 条目名称
ATTACK 1557 Adversary-in-the-Middle
OWASP Attacks - Man-in-the-middle attack
关键信息

CAPEC ID: CAPEC-94

抽象级别: Meta

状态: Stable

典型严重程度: Very High

攻击可能性: High

相关攻击模式