CAPEC-615 Metadata
Likelihood of Attack
Low
Typical Severity
Low
Overview
Summary
Adversaries install Wi-Fi equipment that acts as a legitimate Wi-Fi network access point. When a device connects to this access point, Wi-Fi data traffic is intercepted, captured, and analyzed. This also allows the adversary to use "adversary-in-the-middle" (CAPEC-94) for all communications.
Prerequisites
None
Potential Solutions / Mitigations
Commercial defensive technology that monitors for rogue Wi-Fi access points, adversary-in-the-middle attacks, and anomalous activity with the mobile device baseband radios.
Related Weaknesses (CWE)
CWE ID | Description |
---|---|
CWE-300 | Channel Accessible by Non-Endpoint |
Related CAPECs
CAPEC ID | Description |
---|---|
CAPEC-616 | An adversary provides a malicious version of a resource at a location that is similar to the expected location of a legitimate resource. After establishing the rogue location, the adversary waits for a victim to visit the location and access the malicious resource. |
Stay Ahead of Attack Patterns
Understanding CAPEC patterns helps security professionals anticipate and thwart potential attacks. Leverage these insights to enhance threat modeling, strengthen your software development lifecycle, and train your security teams effectively.