CAPEC 65 Sniff Application Code

Draft Detailed Low Risk
Severity High

Description

An adversary passively sniffs network communications and captures application code bound for an authorized client. Once obtained, they can use it as-is, or through reverse-engineering glean sensitive information or exploit the trust relationship between the client and server. Such code may belong to a dynamic update to the client, a patch being applied to a client component or any such interaction where the client is authorized to communicate with the server.

Attack Execution Flow

2

Mitigations

3

Consequences

Relationships

Related ATT&CK Techniques

1

Resources Required

1