Adversary-in-the-Middle
Adversaries may attempt to position themselves between two or more networked devices using an adversary-in-the-middle technique.
Description
Adversaries may attempt to position themselves between two or more networked devices using an adversary-in-the-middle technique.
Available Mitigations
This technique can be mitigated using 4 documented security measures.
Disable or Remove Feature or ProgramEncrypt Sensitive InformationFilter Network TrafficNetwork Segmentation
Quick Info
- Technique ID
- T1557
- Tactic
- Cred Access
- Sub-Techniques
- 4
- Mitigations
- 4
