CAPEC 94 Adversary in the Middle (AiTM)

Stable Meta High Risk
Severity Very High

Description

{'xhtml:p': 'An adversary targets the communication between two components (typically client and server), in order to alter or obtain data from transactions. A general approach entails the adversary placing themself within the communication channel between the two components.'}

Attack Execution Flow

3

Mitigations

4

Consequences

Relationships

Related ATT&CK Techniques

1