CAPEC 700 Network Boundary Bridging

Draft Standard Medium Risk
Severity High

Description

An adversary which has gained elevated access to network boundary devices may use these devices to create a channel to bridge trusted and untrusted networks. Boundary devices do not necessarily have to be on the network\u00e2\u0080\u0099s edge, but rather must serve to segment portions of the target network the adversary wishes to cross into.

Attack Execution Flow

3

Mitigations

6

Consequences

Relationships

Related ATT&CK Techniques

1

Resources Required

1