Home > CAPEC List > CAPEC-616: Establish Rogue Location (Version 2.10)  

CAPEC-616: Establish Rogue Location

 
Establish Rogue Location
Definition in a New Window Definition in a New Window
Attack Pattern ID: 616
Abstraction: Standard
Status: Stable
Completeness: Complete
Presentation Filter:
+ Summary

An adversary provides a malicious version of a resource at a location that is similar to the expected location of a legitimate resource. After establishing the rogue location, the adversary waits for a victim to visit the location and access the malicious resource.

+ Attack Prerequisites
  • A resource is expected to available to the user.

+ Typical Severity

Medium

+ Typical Likelihood of Exploit

Likelihood: Medium

+ Attacker Skills or Knowledge Required

Skill or Knowledge Level: Low

Adversaries can often purchase low-cost technology to implement rogue access points.

+ Attack Motivation-Consequences
ScopeTechnical ImpactNote
Confidentiality
Integrity
Other
Successful attacks of this nature can result in a wide variety of consequences and negatively impact confidentiality and integrity based on the adversary's subsequent actions.
+ Content History
Submissions
SubmitterOrganizationDateSource
CAPEC Content TeamThe MITRE Corporation2015-11-09Internal_CAPEC_Team
Modifications
ModifierOrganizationDateCommentsSource
CAPEC Content TeamThe MITRE Corporation2017-05-01Updated Attack_Motivation-Consequences, Attack_Prerequisites, Attacker_Skills_or_Knowledge_Required, Description Summary, Related_Weaknesses, Typical_Likelihood_of_ExploitInternal
Previous Entry Names
DatePrevious Entry Name
2017-05-01Patiently Waiting at Incorrect Location
More information is available — Please select a different filter.
Page Last Updated or Reviewed: May 01, 2017