Statements (22)
| Predicate | Object |
|---|---|
| gptkbp:instanceOf |
gptkb:MITRE_ATT&CK_Technique
|
| gptkbp:citation |
https://attack.mitre.org/techniques/T1040/
|
| gptkbp:describes |
Adversaries may sniff network traffic to capture information about the target environment, including credentials and other sensitive data.
|
| gptkbp:detects |
Monitor for use of network sniffing tools and unusual network traffic patterns.
|
| gptkbp:example |
gptkb:tcpdump
gptkb:Wireshark gptkb:Ettercap NetworkMiner dsniff |
| gptkbp:mitigatedBy |
Use encrypted protocols and network segmentation to limit exposure.
|
| gptkbp:partOf |
gptkb:MITRE_ATT&CK_Framework
|
| gptkbp:platform |
gptkb:Windows
gptkb:macOS gptkb:network_protocol gptkb:Linux |
| gptkbp:tactics |
gptkb:Discovery
Credential Access |
| gptkbp:technique |
gptkb:T1040
|
| gptkbp:techniqueName |
Network Sniffing
|
| gptkbp:bfsParent |
gptkb:Freescale_QorIQ_T2
|
| gptkbp:bfsLayer |
7
|
| https://www.w3.org/2000/01/rdf-schema#label |
T1040
|