Threats Library

Reusable threat definitions (causes on the left side of bow-tie diagrams).

Add Threat

Tags: clear tags
Clear all
5 threats — page 1 of 1
Name Category Tags Description
Adversary-in-the-Middle Credential Access Adversaries may attempt to position themselves between two or more networked devices using an advers… Edit
Adversary-in-the-Middle: ARP Cache Poisoning Credential Access Adversaries may poison Address Resolution Protocol (ARP) caches to position themselves between the c… Edit
Adversary-in-the-Middle: DHCP Spoofing Credential Access Adversaries may redirect network traffic to adversary-owned systems by spoofing Dynamic Host Configu… Edit
Adversary-in-the-Middle: Evil Twin Credential Access Adversaries may host seemingly genuine Wi-Fi access points to deceive users into connecting to malic… Edit
Adversary-in-the-Middle: LLMNR/NBT-NS Poisoning and SMB Relay Credential Access By responding to LLMNR/NBT-NS network traffic, adversaries may spoof an authoritative source for nam… Edit