TECHNIQUES
- Home
- Techniques
- Mobile
- Rogue Wi-Fi Access Points
Rogue Wi-Fi Access Points
ID: T1465
Sub-techniques:
No sub-techniques
Tactic Type: Without Adversary Device Access
Tactic:
Network Effects
Platforms: Android, iOS
MTC ID:
LPN-0
Version: 1.1
Created: 25 October 2017
Last Modified: 03 February 2019
Mitigations
Mitigation | Description |
---|---|
Encrypt Network Traffic |
Application-layer encryption (e.g. use of the Transport Layer Security protocol) or a Virtual Private Network (VPN) tunnel (e.g. using the IPsec protocol) may help mitigate use of untrusted Wi-Fi networks. |
Enterprise Policy |
Enterprise policies could be provisioned to devices to control the Wi-Fi access points that they are allowed to connect to. |
References
×