海笋是什么东西| 血压有点低是什么原因| 苯甲酸钠是什么东西| 胆囊壁稍毛糙是什么意思| 为什么晚上不能晾衣服| 孕妇吃什么对胎儿好| 直肠息肉有什么症状| 喝什么祛湿气效果最好| 透析是什么| 脸上为什么长斑| 12月12是什么星座| 墨西哥说什么语言| 7月29号是什么星座| 斤是什么单位| e m s是什么快递| 甲状腺双叶回声欠均匀是什么意思| 什么的眉头| 外面下着雨犹如我心血在滴什么歌| 绿色的蛇是什么蛇| lmy是什么意思| 肌酐高是什么病| bm是什么牌子| 什么血型的人招蚊子| 脉滑是什么意思| 积滞是什么意思| 血小板降低是什么病| 恩泽是什么意思| 了加一笔是什么字| 袋鼠喜欢吃什么食物| 光宗耀祖是什么意思| iv医学上什么意思| 牡丹象征着什么意义| 三和大神是什么意思| 梦见刺猬是什么意思| 扁桃体发炎是什么症状| 万事如意是什么生肖| 长期喝酒有什么危害| 刘德华属什么生肖| 膝盖不舒服挂什么科| 阿莫西林吃多了有什么副作用| 什么是反物质| 久坐伤什么| 篮子房是什么意思| 心有余悸是什么意思| 碳水化合物是什么东西| 萎缩性胃炎伴糜烂吃什么药| 杭州有什么好玩的地方| 西安古代叫什么名字| 女人更年期有什么症状| 冰箱什么牌子的好| 舞象之年是什么意思| 9月份是什么星座的| 梦见狗是什么预兆| 山己念什么| c919是什么意思| 小孩铅过高有什么症状| 尿味道很重是什么原因| 脾围是什么意思| 哺乳期吃辣椒对宝宝有什么影响| 今年是什么属相| 高铁为什么会晚点| 龟头敏感早泄吃什么药| 7年之痒是什么意思| 阳历八月份是什么星座| 双侧附睾头囊肿是什么意思| 双子座是什么时候| 操姓氏读什么| 马来西亚属于什么国家| 孕妇缺铁吃什么| doge是什么意思| 所以然什么意思| 车辆购置税什么时候交| 壁虎在家里是什么征兆| 2月1号什么星座| 产厄是什么意思| 光动力治疗什么| 吃饺子是什么节日| 众叛亲离什么意思| 男人最怕什么| 长大做什么| 连云港有什么好吃的| 孕妇血糖高对胎儿有什么影响| 肝郁是什么意思| 吃红枣有什么好处和坏处| 男士内裤什么材质的好| 上课什么坐姿可以瘦腿| 六月十四号是什么星座| ab型和ab型生的孩子是什么血型| 难能可贵是什么意思| 血小板减少吃什么药| 青少年流鼻血是什么原因引起的| gp是什么意思| 成人高考是什么| 什么叫同房| 为什么手麻| 睡不着觉去医院挂什么科| 怀孕一个月吃什么对宝宝发育好| aoerbo是什么牌子的手表| 经期头疼是什么原因| 又是什么意思| 幽门阳性是什么意思| 空灵是什么意思| phr是什么词性| 血脂高有什么症状表现| dm是什么意思| 夏天能种什么菜| 吃什么可以补胶原蛋白| 摸不到心跳是什么情况| ssa抗体阳性说明什么| 嘴馋是什么意思| 固涩是什么意思| 肝火旺吃什么药好| 血糖高的人早餐吃什么最好| 脸上脂溢性皮炎用什么药| 晚上吃什么| 什么的北京| 吞咽困难挂什么科| 6月18日是什么节日| 月子中心是做什么的| 净身高是什么意思| 老是打嗝什么原因| 蛋白尿是什么病| 海豹油有什么作用| 高频是什么意思| 卤蛋吃多了有什么危害| 四级军士长是什么级别| 白细胞正常c反应蛋白高说明什么| 口字五行属什么| 滞纳金是什么| 老放屁什么原因| 子宫内膜9mm意味着什么| pv是什么意思| 吃什么能减肥最快还能减全身| 744是什么意思| 6月30日是什么座| 满是什么结构| 胃怕凉怕冷是什么原因| 娃娃流鼻血是什么原因| 便秘吃什么好| 梦见别人拉屎是什么意思| 结扎后需要注意什么| 小孩突然头疼是什么原因| 女人喝什么茶减肥好| 人格独立是什么意思| 意念是什么| 食管炎吃什么药| 鼻子流清水是什么原因| 什么是普惠性幼儿园| 紫苏泡酒有什么功效| 得艾滋病的前兆是什么| 过堂是什么意思| 荔枝有什么作用与功效| 盗汗是什么意思| 女性排卵有什么症状或感觉| 树敌是什么意思| 吃什么补骨髓造血| 星星像什么比喻句| 前年是什么年| 生理期不能吃什么水果| 枳是什么意思| 过氧化氢浓度阳性是什么意思| 中药龙骨是什么东西| 根充是什么意思| 脱肛是什么| 双肾囊肿有什么危害| ctc是什么意思| 南北杏和什么煲汤止咳化痰| 石斛什么价格| 脾阳不足吃什么中成药| 肩膀痛挂什么科| 霸王硬上弓是什么意思| 柱镜度数是什么意思| 腹胀是什么感觉| 骨密度是检查什么的| 尿胆原normal是什么意思| 浪子回头是什么意思| 口干口苦口臭吃什么药| 手术后为什么不让睡觉| 一什么月亮| cooc香水是什么牌子的| 岫玉是什么| 为什么一进去就射了| 舌头不舒服挂什么科| 六月26日是什么日子| 养心吃什么食物好| 百合花代表什么意思| 牛肉和什么菜包饺子好吃| 六月下旬是什么时候| 脑供血不足用什么药好| 脸部痤疮用什么药| 孝道是什么意思| 狐狸狗是什么品种| 腰疼什么原因| 1920年属什么生肖| 红红的什么| 咨询什么意思| 拉肚子是什么原因| 备孕检查挂什么科| 神经性头疼吃什么药效果好| 口甘读什么| 小排畸主要检查什么| Fish什么意思| 学兽医需要什么学历| 孕中期头疼是什么原因| 足跟疼痛用什么药| hy什么意思| 当医生需要什么条件| 做造影什么时候做最好| 啃手指甲是什么毛病| 嘴唇上长疱疹用什么药| 芡实适合什么人吃| 多愁善感什么意思| 东边日出西边雨是什么生肖| 眼睛老是流眼泪是什么原因| 父亲节送爸爸什么礼物| 小孩吐奶是什么原因| 男外科都检查什么| 鱼条念什么| 讨吃货什么意思| 九牛一毛是什么意思| 左下腹疼痛是什么原因| 大拇指发麻是什么原因| 什么叫椎间盘膨出| skechers是什么牌子| 鱼鳔是什么东西| 碧螺春属于什么茶类| 杀鸡给猴看什么意思| sf什么意思| 美背是什么| 强直性脊柱炎什么症状| 狗狗犬窝咳吃什么药| 吃什么药补肾| 体温偏低是什么原因| 虹霓是什么意思| 安全总监是什么级别| 2月25日是什么星座| 脚指麻木是什么病先兆| 黄精长什么样| 试商是什么意思| esse是什么牌子的烟| 天后是什么意思| 秦始皇的真名叫什么| 好久不见是什么意思| 世界八大奇迹分别是什么| 闪购是什么| 舒肝健胃丸治什么病| 吃什么对胃好养胃| 2003年是什么年| 糖尿病主食吃什么好| 蟑螂为什么会飞| 子宫直肠凹积液是什么意思| bmg是什么意思| 巳蛇五行属什么| 白细胞减少是什么原因| 幽门螺杆菌吃什么药最好| 小孩记忆力差需要补充什么营养| 月经提前吃什么药| 日本什么时候开始侵略中国| 舌苔发青是什么原因| 哺乳期可以吃什么消炎药| 天干是什么| 激动是什么意思| 鱼吐泡泡是什么原因| 侧重点是什么意思| 百度
CAPEC

网传自来水含氯蒸煮食物会致癌 专家:不影响健康

百度 农民工进城以后,由于常年在外地工作、生活,实际上失去了对其户籍所在地农村社会管理的参与权,同时由于并未在城市获得被认可的社会角色,无法参与当地公共事务的管理,难以获得其工作和生活的城市社会管理的参与权。

A Community Resource for Identifying and Understanding Attacks

New to CAPEC? Start Here
Home > CAPEC List > CAPEC-21: Exploitation of Trusted Identifiers (Version 3.9)  

CAPEC-21: Exploitation of Trusted Identifiers

Attack Pattern ID: 21
Abstraction: Meta
View customized information:
+ Description

An adversary guesses, obtains, or "rides" a trusted identifier (e.g. session ID, resource ID, cookie, etc.) to perform authorized actions under the guise of an authenticated user or service.

+ Extended Description

Attacks leveraging trusted identifiers typically result in the adversary laterally moving within the local network, since users are often allowed to authenticate to systems/applications within the network using the same identifier. This allows the adversary to obtain sensitive data, download/install malware on the system, pose as a legitimate user for social engineering purposes, and more.

Attacks on trusted identifiers take advantage of the fact that some software accepts user input without verifying its authenticity. Many server side processes are vulnerable to these attacks because the server to server communications have not been analyzed from a security perspective or the processes "trust" other systems because they are behind a firewall. Similarly, servers that use easy to guess or spoofable schemes for representing digital identity can also be vulnerable. Such systems frequently use schemes without cryptography and digital signatures (or with broken cryptography). Identifiers may be guessed or obtained due to insufficient randomness, poor protection (passed/stored in the clear), lack of integrity (unsigned), or improper correlation with access control policy enforcement points. Exposed configuration and properties files that contain sensitive data may additionally provide an adversary with the information needed to obtain these identifiers. An adversary may also "ride" an identifier via a malicious link, as is the case in Cross Site Request Forgery (CSRF) attacks.

Regardless of the attack vector, successful spoofing and impersonation of trusted credentials can lead to an adversary breaking authentication, authorization, and audit controls with the target system or application.

+ Likelihood Of Attack

High

+ Typical Severity

High

+ Relationships
Section HelpThis table shows the other attack patterns and high level categories that are related to this attack pattern. These relationships are defined as ChildOf and ParentOf, and give insight to similar items that may exist at higher and lower levels of abstraction. In addition, relationships such as CanFollow, PeerOf, and CanAlsoBe are defined to show similar attack patterns that the user may want to explore.
NatureTypeIDName
ParentOfStandard Attack PatternStandard Attack Pattern - A standard level attack pattern in CAPEC is focused on a specific methodology or technique used in an attack. It is often seen as a singular piece of a fully executed attack. A standard attack pattern is meant to provide sufficient details to understand the specific technique and how it attempts to accomplish a desired goal. A standard level attack pattern is a specific type of a more abstract meta level attack pattern.62Cross Site Request Forgery
ParentOfStandard Attack PatternStandard Attack Pattern - A standard level attack pattern in CAPEC is focused on a specific methodology or technique used in an attack. It is often seen as a singular piece of a fully executed attack. A standard attack pattern is meant to provide sufficient details to understand the specific technique and how it attempts to accomplish a desired goal. A standard level attack pattern is a specific type of a more abstract meta level attack pattern.196Session Credential Falsification through Forging
ParentOfStandard Attack PatternStandard Attack Pattern - A standard level attack pattern in CAPEC is focused on a specific methodology or technique used in an attack. It is often seen as a singular piece of a fully executed attack. A standard attack pattern is meant to provide sufficient details to understand the specific technique and how it attempts to accomplish a desired goal. A standard level attack pattern is a specific type of a more abstract meta level attack pattern.510SaaS User Request Forgery
ParentOfStandard Attack PatternStandard Attack Pattern - A standard level attack pattern in CAPEC is focused on a specific methodology or technique used in an attack. It is often seen as a singular piece of a fully executed attack. A standard attack pattern is meant to provide sufficient details to understand the specific technique and how it attempts to accomplish a desired goal. A standard level attack pattern is a specific type of a more abstract meta level attack pattern.593Session Hijacking
PeerOfStandard Attack PatternStandard Attack Pattern - A standard level attack pattern in CAPEC is focused on a specific methodology or technique used in an attack. It is often seen as a singular piece of a fully executed attack. A standard attack pattern is meant to provide sufficient details to understand the specific technique and how it attempts to accomplish a desired goal. A standard level attack pattern is a specific type of a more abstract meta level attack pattern.12Choosing Message Identifier
Section HelpThis table shows the views that this attack pattern belongs to and top level categories within that view.
+ Execution Flow
Explore
  1. Survey the application for Indicators of Susceptibility: Using a variety of methods, until one is found that applies to the target, the adversary probes for cookies, session tokens, or entry points that bypass identifiers altogether.

    Techniques
    Spider all available pages
    Attack known bad interfaces
    Search outward-facing configuration and properties files for identifiers.
Experiment
  1. Fetch samples: The adversary fetches many samples of identifiers. This may be through legitimate access (logging in, legitimate connections, etc.) or via systematic probing.

    Techniques
    An adversary makes many anonymous connections and records the session IDs assigned.
    An adversary makes authorized connections and records the session tokens or credentials issued.
    An adversary gains access to (legitimately or illegitimately) a nearby system (e.g., in the same operations network, DMZ, or local network) and makes a connection from it, attempting to gain the same privileges as a trusted system.
Exploit
  1. Impersonate: An adversary can use successful experiments or authentications to impersonate an authorized user or system or to laterally move within a system or application

  2. Spoofing: Malicious data can be injected into the target system or into a victim user's system by an adversary. The adversary can also pose as a legitimate user to perform social engineering attacks.

  3. Data Exfiltration: The adversary can obtain sensitive data contained within the system or application.

+ Prerequisites
Server software must rely on weak identifier proof and/or verification schemes.
Identifiers must have long lifetimes and potential for reusability.
Server software must allow concurrent sessions to exist.
+ Skills Required
[Level: Low]
To achieve a direct connection with the weak or non-existent server session access control, and pose as an authorized user
+ Resources Required
Ability to deploy software on network.
Ability to communicate synchronously or asynchronously with server.
+ Consequences
Section HelpThis table specifies different individual consequences associated with the attack pattern. The Scope identifies the security property that is violated, while the Impact describes the negative technical impact that arises if an adversary succeeds in their attack. The Likelihood provides information about how likely the specific consequence is expected to be seen relative to the other consequences in the list. For example, there may be high likelihood that a pattern will be used to achieve a certain impact, but a low likelihood that it will be exploited to achieve a different impact.
ScopeImpactLikelihood
Confidentiality
Access Control
Authentication
Gain Privileges
Confidentiality
Read Data
Integrity
Modify Data
+ Mitigations
Design: utilize strong federated identity such as SAML to encrypt and sign identity tokens in transit.
Implementation: Use industry standards session key generation mechanisms that utilize high amount of entropy to generate the session key. Many standard web and application servers will perform this task on your behalf.
Implementation: If the identifier is used for authentication, such as in the so-called single sign on use cases, then ensure that it is protected at the same level of assurance as authentication tokens.
Implementation: If the web or application server supports it, then encrypting and/or signing the identifier (such as cookie) can protect the ID if intercepted.
Design: Use strong session identifiers that are protected in transit and at rest.
Implementation: Utilize a session timeout for all sessions, for example 20 minutes. If the user does not explicitly logout, the server terminates their session after this period of inactivity. If the user logs back in then a new session key is generated.
Implementation: Verify authenticity of all identifiers at runtime.
+ Example Instances

Thin client applications like web applications are particularly vulnerable to session ID attacks. Since the server has very little control over the client, but still must track sessions, data, and objects on the server side, cookies and other mechanisms have been used to pass the key to the session data between the client and server. When these session keys are compromised it is trivial for an adversary to impersonate a user's session in effect, have the same capabilities as the authorized user. There are two main ways for an adversary to exploit session IDs.

A brute force attack involves an adversary repeatedly attempting to query the system with a spoofed session header in the HTTP request. A web server that uses a short session ID can be easily spoofed by trying many possible combinations so the parameters session-ID= 1234 has few possible combinations, and an adversary can retry several hundred or thousand request with little to no issue on their side.

The second method is interception, where a tool such as wireshark is used to sniff the wire and pull off any unprotected session identifiers. The adversary can then use these variables and access the application.

For example, in a message queuing system that allows service requesters to post messages to its queue through an open channel (such as anonymous FTP), authorization is done through checking group or role membership contained in the posted message. However, there is no proof that the message itself, the information in the message (such group or role membership), or the process that wrote the message to the queue is authentic and authorized to do so.
+ Taxonomy Mappings
Section HelpCAPEC mappings to ATT&CK techniques leverage an inheritance model to streamline and minimize direct CAPEC/ATT&CK mappings. Inheritance of a mapping is indicated by text stating that the parent CAPEC has relevant ATT&CK mappings. Note that the ATT&CK Enterprise Framework does not use an inheritance model as part of the mapping to CAPEC.
Relevant to the ATT&CK taxonomy mapping
Entry IDEntry Name
1134Access Token Manipulation
1528Steal Application Access Token
1539Steal Web Session Cookie
+ References
[REF-1] G. Hoglund and G. McGraw. "Exploiting Software: How to Break Code". Addison-Wesley. 2004-02.
+ Content History
Submissions
Submission DateSubmitterOrganization
2025-08-05
(Version 2.6)
CAPEC Content TeamThe MITRE Corporation
Modifications
Modification DateModifierOrganization
2025-08-05
(Version 2.7)
CAPEC Content TeamThe MITRE Corporation
Updated Related_Attack_Patterns
2025-08-05
(Version 3.3)
CAPEC Content TeamThe MITRE Corporation
Updated @Name, @Status, Consequences, Description, Example_Instances, Execution_Flow, Mitigations, Prerequisites, Resources_Required, Taxonomy_Mappings
2025-08-05
(Version 3.4)
CAPEC Content TeamThe MITRE Corporation
Updated Description, Example_Instances
2025-08-05
(Version 3.5)
CAPEC Content TeamThe MITRE Corporation
Updated Taxonomy_Mappings
2025-08-05
(Version 3.7)
CAPEC Content TeamThe MITRE Corporation
Updated Description, Extended_Description
2025-08-05
(Version 3.8)
CAPEC Content TeamThe MITRE Corporation
Updated Taxonomy_Mappings
Previous Entry Names
Change DatePrevious Entry Name
2025-08-05
(Version 2.7)
Exploitation of Session Variables, Resource IDs and other Trusted Credentials
2025-08-05
(Version 3.3)
Exploitation of Trusted Credentials
More information is available — Please select a different filter.
Page Last Updated or Reviewed: July 30, 2020
喝中药不能吃什么东西 甲状腺密度不均匀是什么意思 今天是什么生肖日 哥弟属于什么档次 什么少年
打鸡血是什么意思 自言自语是什么原因导致 咖啡有什么好处 震楼神器楼上什么感觉 丞相和宰相有什么区别
更年期皮肤瘙痒是什么原因 梦见芝麻是什么意思 特朗普为什么叫川普 月经老是推后是什么原因 月桂酰两性基乙酸钠是什么
女人阳虚吃什么药效果最好 地贫是什么意思 推举是什么意思 排卵是什么意思 生日礼物送什么好
宫颈炎用什么药物治疗比较好hcv9jop1ns9r.cn gjb2基因杂合突变是什么意思hcv9jop3ns4r.cn 补肾气吃什么药hcv7jop6ns4r.cn 治安大队是干什么的hcv7jop9ns6r.cn 化疗后吃什么增强免疫力hcv9jop5ns1r.cn
金箔金命是什么意思hcv9jop4ns8r.cn 牙疼吃什么水果hcv8jop1ns4r.cn 山不转水转是什么意思hcv9jop2ns1r.cn 肺炎不能吃什么hcv9jop3ns9r.cn 什么是叠词hcv9jop6ns3r.cn
高处不胜寒的胜是什么意思cl108k.com 芦荟有什么功效与作用hcv9jop7ns2r.cn 什么是有意义的东西hcv8jop6ns1r.cn 婴儿有眼屎是什么原因引起的hcv7jop6ns7r.cn 牡丹是什么植物hcv9jop6ns0r.cn
nbcs是什么意思hcv8jop9ns5r.cn 绒毛膜促性腺激素是什么意思hcv7jop6ns6r.cn 剪刀是什么生肖hcv9jop2ns6r.cn 品学兼优是什么意思liaochangning.com 什么品种的西瓜最好吃hcv8jop2ns2r.cn
百度