| Home > CAPEC List > CAPEC-94: Adversary in the Middle (AiTM) (Version 3.9) |
|
An adversary targets the communication between two components (typically client and server), in order to alter or obtain data from transactions. A general approach entails the adversary placing themself within the communication channel between the two components.
Whenever one component attempts to communicate with the other (data flow, authentication challenges, etc.), the data first flows through the adversary, who has the opportunity to observe or alter it, before being passed on to the intended recipient as if it was never observed. This interposition is transparent leaving the two compromised components unaware of the potential corruption or leakage of their communications. The potential for these attacks yields an implicit lack of trust in communication or identify between two components.
These attacks differ from Sniffing Attacks (CAPEC-157) since these attacks often modify the communications prior to delivering it to the intended recipient.
Term: Man-in-the-Middle / MITM
Term: Person-in-the-Middle / PiTM
Term: Monkey-in-the-Middle
Term: Monster-in-the-Middle
Term: On-path Attacker
High
Very High
| Nature | Type | ID | Name |
|---|---|---|---|
| ParentOf | Standard Attack PatternStandard Attack Pattern - A standard level attack pattern in CAPEC is focused on a specific methodology or technique used in an attack. It is often seen as a singular piece of a fully executed attack. A standard attack pattern is meant to provide sufficient details to understand the specific technique and how it attempts to accomplish a desired goal. A standard level attack pattern is a specific type of a more abstract meta level attack pattern. | 219 | XML Routing Detour Attacks |
| ParentOf | Standard Attack PatternStandard Attack Pattern - A standard level attack pattern in CAPEC is focused on a specific methodology or technique used in an attack. It is often seen as a singular piece of a fully executed attack. A standard attack pattern is meant to provide sufficient details to understand the specific technique and how it attempts to accomplish a desired goal. A standard level attack pattern is a specific type of a more abstract meta level attack pattern. | 384 | Application API Message Manipulation via Man-in-the-Middle |
| ParentOf | Standard Attack PatternStandard Attack Pattern - A standard level attack pattern in CAPEC is focused on a specific methodology or technique used in an attack. It is often seen as a singular piece of a fully executed attack. A standard attack pattern is meant to provide sufficient details to understand the specific technique and how it attempts to accomplish a desired goal. A standard level attack pattern is a specific type of a more abstract meta level attack pattern. | 386 | Application API Navigation Remapping |
| ParentOf | Standard Attack PatternStandard Attack Pattern - A standard level attack pattern in CAPEC is focused on a specific methodology or technique used in an attack. It is often seen as a singular piece of a fully executed attack. A standard attack pattern is meant to provide sufficient details to understand the specific technique and how it attempts to accomplish a desired goal. A standard level attack pattern is a specific type of a more abstract meta level attack pattern. | 466 | Leveraging Active Adversary in the Middle Attacks to Bypass Same Origin Policy |
| ParentOf | Standard Attack PatternStandard Attack Pattern - A standard level attack pattern in CAPEC is focused on a specific methodology or technique used in an attack. It is often seen as a singular piece of a fully executed attack. A standard attack pattern is meant to provide sufficient details to understand the specific technique and how it attempts to accomplish a desired goal. A standard level attack pattern is a specific type of a more abstract meta level attack pattern. | 662 | Adversary in the Browser (AiTB) |
| ParentOf | Standard Attack PatternStandard Attack Pattern - A standard level attack pattern in CAPEC is focused on a specific methodology or technique used in an attack. It is often seen as a singular piece of a fully executed attack. A standard attack pattern is meant to provide sufficient details to understand the specific technique and how it attempts to accomplish a desired goal. A standard level attack pattern is a specific type of a more abstract meta level attack pattern. | 701 | Browser in the Middle (BiTM) |
| CanFollow | Meta Attack PatternMeta Attack Pattern - A meta level attack pattern in CAPEC is a decidedly abstract characterization of a specific methodology or technique used in an attack. A meta attack pattern is often void of a specific technology or implementation and is meant to provide an understanding of a high level approach. A meta level attack pattern is a generalization of related group of standard level attack patterns. Meta level attack patterns are particularly useful for architecture and design level threat modeling exercises. | 216 | Communication Channel Manipulation |
| CanFollow | Detailed Attack PatternDetailed Attack Pattern - A detailed level attack pattern in CAPEC provides a low level of detail, typically leveraging a specific technique and targeting a specific technology, and expresses a complete execution flow. Detailed attack patterns are more specific than meta attack patterns and standard attack patterns and often require a specific protection mechanism to mitigate actual attacks. A detailed level attack pattern often will leverage a number of different standard level attack patterns chained together to accomplish a goal. | 383 | Harvesting Information via API Event Monitoring |
| CanFollow | Standard Attack PatternStandard Attack Pattern - A standard level attack pattern in CAPEC is focused on a specific methodology or technique used in an attack. It is often seen as a singular piece of a fully executed attack. A standard attack pattern is meant to provide sufficient details to understand the specific technique and how it attempts to accomplish a desired goal. A standard level attack pattern is a specific type of a more abstract meta level attack pattern. | 697 | DHCP Spoofing |
| CanPrecede | Meta Attack PatternMeta Attack Pattern - A meta level attack pattern in CAPEC is a decidedly abstract characterization of a specific methodology or technique used in an attack. A meta attack pattern is often void of a specific technology or implementation and is meant to provide an understanding of a high level approach. A meta level attack pattern is a generalization of related group of standard level attack patterns. Meta level attack patterns are particularly useful for architecture and design level threat modeling exercises. | 151 | Identity Spoofing |
| CanPrecede | Standard Attack PatternStandard Attack Pattern - A standard level attack pattern in CAPEC is focused on a specific methodology or technique used in an attack. It is often seen as a singular piece of a fully executed attack. A standard attack pattern is meant to provide sufficient details to understand the specific technique and how it attempts to accomplish a desired goal. A standard level attack pattern is a specific type of a more abstract meta level attack pattern. | 668 | Key Negotiation of Bluetooth Attack (KNOB) |
| CanPrecede | Standard Attack PatternStandard Attack Pattern - A standard level attack pattern in CAPEC is focused on a specific methodology or technique used in an attack. It is often seen as a singular piece of a fully executed attack. A standard attack pattern is meant to provide sufficient details to understand the specific technique and how it attempts to accomplish a desired goal. A standard level attack pattern is a specific type of a more abstract meta level attack pattern. | 271 | Schema Poisoning |
| View Name | Top Level Categories |
|---|---|
| Domains of Attack | Software, Communications |
| Mechanisms of Attack | Subvert Access Control |
Determine Communication Mechanism: The adversary determines the nature and mechanism of communication between two components, looking for opportunities to exploit.
| Techniques |
|---|
| Perform a sniffing attack and observe communication to determine a communication protocol. |
| Look for application documentation that might describe a communication mechanism used by a target. |
Position In Between Targets: The adversary inserts themself into the communication channel initially acting as a routing proxy between the two targeted components.
| Techniques |
|---|
| Install spyware on a client that will intercept outgoing packets and route them to their destination as well as route incoming packets back to the client. |
| Exploit a weakness in an encrypted communication mechanism to gain access to traffic. Look for outdated mechanisms such as SSL. |
Use Intercepted Data Maliciously: The adversary observes, filters, or alters passed data of its choosing to gain access to sensitive information or to manipulate the actions of the two target components for their own purposes.
| Techniques |
|---|
| Prevent some messages from reaching their destination, causing a denial of service. |
| Scope | Impact | Likelihood |
|---|---|---|
Integrity | Modify Data | |
Confidentiality Access Control Authorization | Gain Privileges | |
Confidentiality | Read Data |
In 2017, security researcher Jerry Decime discovered that Equifax mobile applications were not leveraging HTTPS in all areas. Although authentication was properly utilizing HTTPS, in addition to validating the root of trust of the server certificate, other areas of the application were using HTTP to communicate. Adversaries could then conduct MITM attacks on rogue WiFi or cellular networks and hijack the UX. This further allowed the adversaries to prompt users for sensitive data, which could then be obtained in the plaintext response. [REF-636]
| CWE-ID | Weakness Name |
|---|---|
| 300 | Channel Accessible by Non-Endpoint |
| 290 | Authentication Bypass by Spoofing |
| 593 | Authentication Bypass: OpenSSL CTX Object Modified after SSL Objects are Created |
| 287 | Improper Authentication |
| 294 | Authentication Bypass by Capture-replay |
| Entry ID | Entry Name |
|---|---|
| 1557 | Adversary-in-the-Middle |
| Entry Name |
|---|
| Man-in-the-middle attack |
| Submissions | |||
|---|---|---|---|
| Submission Date | Submitter | Organization | |
| 2014年06月23日 (Version 2.6) | CAPEC Content Team | The MITRE Corporation | |
| Modifications | |||
| Modification Date | Modifier | Organization | |
| 2017年08月04日 (Version 2.11) | CAPEC Content Team | The MITRE Corporation | |
| Updated Examples-Instances, Related_Vulnerabilities | |||
| 2018年07月31日 (Version 2.12) | CAPEC Content Team | The MITRE Corporation | |
| Updated References | |||
| 2019年04月04日 (Version 3.1) | CAPEC Content Team | The MITRE Corporation | |
| Updated Example_Instances, Related_Attack_Patterns, Taxonomy_Mappings | |||
| 2019年09月30日 (Version 3.2) | CAPEC Content Team | The MITRE Corporation | |
| Updated @Abstraction, Description, Related_Attack_Patterns | |||
| 2020年07月30日 (Version 3.3) | CAPEC Content Team | The MITRE Corporation | |
| Updated Description, Example_Instances, Execution_Flow, Taxonomy_Mappings | |||
| 2020年12月17日 (Version 3.4) | CAPEC Content Team | The MITRE Corporation | |
| Updated Related_Attack_Patterns, Taxonomy_Mappings | |||
| 2021年06月24日 (Version 3.5) | CAPEC Content Team | The MITRE Corporation | |
| Updated @Name, @Status, Alternate_Terms, Description, Example_Instances, Execution_Flow, Mitigations, References, Related_Attack_Patterns, Related_Weaknesses, Taxonomy_Mappings | |||
| 2022年02月22日 (Version 3.7) | CAPEC Content Team | The MITRE Corporation | |
| Updated Description, Execution_Flow, Extended_Description | |||
| 2022年09月29日 (Version 3.8) | CAPEC Content Team | The MITRE Corporation | |
| Updated Taxonomy_Mappings | |||
| Previous Entry Names | |||
| Change Date | Previous Entry Name | ||
| 2021年06月24日 (Version 3.5) | Man in the Middle Attack | ||
|
Use of the Common Attack Pattern Enumeration and Classification (CAPEC), and the associated references from this website are subject to the Terms of Use. Copyright © 2007–2025, The MITRE Corporation. CAPEC and the CAPEC logo are trademarks of The MITRE Corporation. |
||