Home > CAPEC List > CAPEC-616: Establish Rogue Location (Version 2.11)  

CAPEC-616: Establish Rogue Location

Establish Rogue Location
Definition in a New Window Definition in a New Window
Attack Pattern ID: 616
Abstraction: Standard
Status: Stable
Completeness: Complete
Presentation Filter:
+ Summary

An adversary provides a malicious version of a resource at a location that is similar to the expected location of a legitimate resource. After establishing the rogue location, the adversary waits for a victim to visit the location and access the malicious resource.

+ Attack Prerequisites
  • A resource is expected to available to the user.

+ Typical Severity


+ Typical Likelihood of Exploit

Likelihood: Medium

+ Attacker Skills or Knowledge Required

Skill or Knowledge Level: Low

Adversaries can often purchase low-cost technology to implement rogue access points.

+ Attack Motivation-Consequences
ScopeTechnical ImpactNote
Successful attacks of this nature can result in a wide variety of consequences and negatively impact confidentiality and integrity based on the adversary's subsequent actions.
+ Content History
CAPEC Content TeamThe MITRE Corporation2015-11-09Internal_CAPEC_Team
CAPEC Content TeamThe MITRE Corporation2017-05-01Updated Attack_Motivation-Consequences, Attack_Prerequisites, Attacker_Skills_or_Knowledge_Required, Description Summary, Related_Weaknesses, Typical_Likelihood_of_ExploitInternal
Previous Entry Names
DatePrevious Entry Name
2017-05-01Patiently Waiting at Incorrect Location

More information is available — Please select a different filter.
Page Last Updated or Reviewed: August 04, 2017