Esc
Adversary-in-the-Middle - T1557
(ATT&CK® Technique)
Definition
Adversaries may attempt to position themselves between two or more networked devices using an adversary-in-the-middle (AiTM) technique to support follow-on behaviors such as Network Sniffing, Transmitted Data Manipulation, or replay attacks (Exploitation for Credential Access). By abusing features of common networking protocols that can determine the flow of network traffic (e.g. ARP, DNS, LLMNR, etc.), adversaries may force a device to communicate through an adversary controlled system so they can collect information or perform additional actions.
D3FEND Inferred Relationships
Browse the D3FEND knowledge graph by clicking on the nodes below.