CAPEC-192: Protocol Analysis
An adversary engages in activities to decipher and/or decode protocol information for a network or application communication protocol used for transmitting information between interconnected nodes or systems on a packet-switched data network. While this type of analysis involves the analysis of a networking protocol inherently, it does not require the presence of an actual or physical network.
Severity
Low
Likelihood
Low
3
/ 100
low-risk
Active Threat
2/50 · Minimal
Exploit Availability
1/50 · Minimal