Man-in-the-Middle Attack
mediummitm-attack
Attacker intercepts and potentially modifies communication between two connected services
TamperingInformation DisclosureSpoofing
MITRE ATT&CK techniques
| ID | Name | Tactic |
|---|---|---|
| T1557 | Adversary-in-the-Middle | Credential Access |
| T1040 | Network Sniffing | Credential Access |
Common Weakness Enumeration
Mitigating controls
ctrl-mitm-1- Encrypt all traffic using TLS 1.2 or higher
ctrl-mitm-2- Implement mutual TLS (mTLS) authentication
ctrl-mitm-3- Use certificate pinning where applicable
ctrl-mitm-4- Implement network segmentation