Adversaries may attempt to position themselves between two or more networked devices using a man-in-the-middle (MiTM) technique to support follow-on behaviors such as Network Sniffing or Transmitted Data Manipulation. By abusing features of common networking protocols that can determine the flow of network traffic (e.g. ARP, DNS, LLMNR, etc.), adversaries may force a device to communicate through an adversary controlled system so they can collect information or perform additional actions.(Citation: Rapid7 MiTM Basics)
Adversaries may leverage the MiTM position to attempt to modify traffic, such as in Transmitted Data Manipulation. Adversaries can also stop traffic from flowing to the appropriate destination, causing denial of service.
View in MITRE ATT&CK®Capability ID | Capability Description | Mapping Type | ATT&CK ID | ATT&CK Name | Notes |
---|---|---|---|---|---|
network_security_groups | Network Security Groups | technique_scores | T1557 | Man-in-the-Middle |
Comments
This control can be used to limit access to network infrastructure and resources that can be used to reshape traffic or otherwise produce MiTM conditions.
References
|
azure_sentinel | Azure Sentinel | technique_scores | T1557 | Man-in-the-Middle |
Comments
This control can identify one of this technique's sub-techniques when executed via "Powershell Empire cmdlets seen in command line", but does not address other procedures.
References
|
microsoft_defender_for_identity | Microsoft Defender for Identity | technique_scores | T1557 | Man-in-the-Middle |
Comments
This control provides minimal detection for one of this technique's sub-techniques, while not providing any detection for the other, resulting in an overall Minimal score.
References
|
azure_private_link | Azure Private Link | technique_scores | T1557 | Man-in-the-Middle |
Comments
This control provides partial protection for this technique's sub-techniques resulting in an overall Partial score.
References
|
azure_vpn_gateway | Azure VPN Gateway | technique_scores | T1557 | Man-in-the-Middle |
Comments
This control can mitigate Man-in-the-Middle attacks that manipulate network protocol data in transit.
References
|
Technique ID | Technique Name | Number of Mappings |
---|---|---|
T1557.002 | ARP Cache Poisoning | 24 |
T1557.001 | LLMNR/NBT-NS Poisoning and SMB Relay | 19 |