CAPEC-226: Session Credential Falsification through Manipulation

Detailed Draft 严重程度: Medium

CAPEC版本: 3.9

更新日期: 2023-01-24

攻击模式描述

An attacker manipulates an existing credential in order to gain access to a target application. Session credentials allow users to identify themselves to a service after an initial authentication without needing to resend the authentication information (usually a username and password) with every message. An attacker may be able to manipulate a credential sniffed from an existing connection in order to gain access to a target server.

前提条件

  • The targeted application must use session credentials to identify legitimate users.

所需资源

  • An attacker will need tools to sniff existing credentials (possibly their own) in order to retrieve a base credential for modification. They will need to understand how the components of the credential affect server behavior and how to manipulate this behavior by changing the credential. Finally, they will need tools to allow them to craft and transmit a modified credential.
关键信息

CAPEC ID: CAPEC-226

抽象级别: Detailed

状态: Draft

典型严重程度: Medium

相关攻击模式
相关CWE弱点