Network Traffic Capture or Redirection (T1410)

View on ATT&CK

In Playbook

Technique & Subtechniques

  • Network Traffic Capture or Redirection

Associated Tactics

  • Collection
  • Credential Access

Collection (TA0035)

The adversary is trying to gather data of interest to their goal. Collection consists of techniques used to identify and gather information, such as sensitive files, from a target network prior to exfiltration. This category also covers locations on a system or network where the adversary may look for information to exfiltrate.

View on ATT&CK

Procedure Examples

Description Source(s)
Yair Amit. (2013, March 12). Malicious Profiles - The Sleeping Giant of iOS Security. Retrieved December 22, 2016. Skycure-Profiles