Threats Library
Reusable threat definitions (causes on the left side of bow-tie diagrams).
Add Threat
Tags:
clear tags
5 threats — page 1 of 1
| Name | Category | Tags | Description | |
|---|---|---|---|---|
| Adversary-in-the-Middle | Credential Access | Adversaries may attempt to position themselves between two or more networked devices using an advers… | Edit | |
| Adversary-in-the-Middle: ARP Cache Poisoning | Credential Access | Adversaries may poison Address Resolution Protocol (ARP) caches to position themselves between the c… | Edit | |
| Adversary-in-the-Middle: DHCP Spoofing | Credential Access | Adversaries may redirect network traffic to adversary-owned systems by spoofing Dynamic Host Configu… | Edit | |
| Adversary-in-the-Middle: Evil Twin | Credential Access | Adversaries may host seemingly genuine Wi-Fi access points to deceive users into connecting to malic… | Edit | |
| Adversary-in-the-Middle: LLMNR/NBT-NS Poisoning and SMB Relay | Credential Access | By responding to LLMNR/NBT-NS network traffic, adversaries may spoof an authoritative source for nam… | Edit |