ryuki's blog

ryuki's blog

root

/

tags

/

Adversary in the Middle (T1557)

Adversary-in-the-Middle (T1557)

Jan 01, 19701 min read

Adversaries may attempt to position themselves between two or more networked devices using an adversary-in-the-middle (AiTM) technique to support follow-on behaviors such as [Network Sniffing](https://attack.

Tactics
TA0006 TA0009

Sub-techniques
T1557.001 T1557.002 T1557.003


See: MITRE ATT&CK

2 items with this tag.

  • Nov 22, 2025

    Mirage

    • hackthebox
    • hard
    • windows
    • dns
    • nats
    • esc10
    • adcs
    • gmsa
    • kerberoast
    • T1078
    • T1078.002
    • T1078.003
    • T1098
    • T1098.007
    • T1110
    • T1110.002
    • T1187
    • T1550
    • T1550.002
    • T1550.003
    • T1557
    • T1558
    • T1558.003
  • Aug 30, 2025

    Eureka

    • hackthebox
    • hard
    • linux
    • spring
    • actuator
    • eureka
    • bash-injection
    • injection
    • memory
    • T1078
    • T1078.003
    • T1190
    • T1552
    • T1552.001
    • T1557

Created with ❤️ and Quartz

  • Mastodon
  • Bluesky
  • GitHub