This tool provides the functional ability to clone traffic, but is not considered a stand-alone security control as it requires a secondary security tool (e.g., IDS/IPS) to enable cyber defense and digital forensics.
Capability ID | Capability Description | Category | Value | ATT&CK ID | ATT&CK Name |
---|---|---|---|---|---|
No mappings found for this technique in ATT&CK version . Change versions of ATT&CK or check out a different technique with Matrix View. |