Protocol Manipulation
Attack Pattern ID: 272 (Standard Attack Pattern Completeness: Stub)Typical Severity: MediumStatus: Draft
+ Description

Summary

The attacker subverts a communications protocol to perform an attack. These attacks can allow the attacker to impersonate others, discover sensitive information, control the outcome of a session, or perform other attacks. These attacks target invalid assumptions that may be inherent in implementers of the protocol, incorrect implementations of the protocol, or vulnerabilities in the protocol itself.

+ Attack Prerequisites

The protocol or implementations thereof must contain bugs that an attacker can exploit.

+ Resources Required

In some variants of this attack the attacker must be able to intercept communications using the protocol. This means they need to be able to receive the communications from one participant and prevent the other participant from receiving these communications.

+ Related Attack Patterns
NatureTypeIDNameDescriptionView(s) this relationship pertains toView\(s\)
ChildOfCategoryCategory262Resource Manipulation 
Mechanism of Attack (primary)1000
ParentOfAttack PatternAttack Pattern168Windows ::DATA Alternate Data Stream 
Mechanism of Attack (primary)1000
ParentOfAttack PatternAttack Pattern220Client-Server Protocol Manipulation 
Mechanism of Attack (primary)1000
ParentOfAttack PatternAttack Pattern275DNS Rebinding 
Mechanism of Attack (primary)1000
ParentOfAttack PatternAttack Pattern276Inter-component Protocol Manipulation 
Mechanism of Attack (primary)1000
ParentOfAttack PatternAttack Pattern277Data Interchange Protocol Manipulation 
Mechanism of Attack (primary)1000
ParentOfCategoryCategory278Web Services Protocol Manipulation 
Mechanism of Attack1000