Prerequisites
The ability to monitor network communications.Access to at least one host, and the privileges to interface with the network interface card.
Resources Required
Any tool capable of monitoring network communications, like a packet sniffer (e.g., Wireshark)
Related Weaknesses
CWE-ID |
Weakness Name |
|
Exposure of Sensitive Information to an Unauthorized Actor The product exposes sensitive information to an actor that is not explicitly authorized to have access to that information. |
References
REF-33
Hacking Exposed: Network Security Secrets & Solutions
Stuart McClure, Joel Scambray, George Kurtz.
REF-128
RFC793 - Transmission Control Protocol
Defense Advanced Research Projects Agency Information Processing Techniques Office, Information Sciences Institute University of Southern California.
http://www.faqs.org/rfcs/rfc793.html REF-212
Nmap Network Scanning: The Official Nmap Project Guide to Network Discovery and Security Scanning
Gordon "Fyodor" Lyon.
REF-130
The Art of Port Scanning
Gordon "Fyodor" Lyon.
http://phrack.org/issues/51/11.html
Submission
Name |
Organization |
Date |
Date release |
CAPEC Content Team |
The MITRE Corporation |
2014-06-23 +00:00 |
|
Modifications
Name |
Organization |
Date |
Comment |
CAPEC Content Team |
The MITRE Corporation |
2017-05-01 +00:00 |
Updated Attack_Motivation-Consequences, Attack_Prerequisites, Description Summary, Related_Attack_Patterns, Resources_Required, Typical_Likelihood_of_Exploit |
CAPEC Content Team |
The MITRE Corporation |
2018-07-31 +00:00 |
Updated References, Related_Weaknesses |
CAPEC Content Team |
The MITRE Corporation |
2022-09-29 +00:00 |
Updated Taxonomy_Mappings |