CAPEC Details | |||||
---|---|---|---|---|---|
Name | Protocol Manipulation | ||||
| |||||
Summary | An adversary subverts a communications protocol to perform an attack. This type of attack can allow an adversary to impersonate others, discover sensitive information, control the outcome of a session, or perform other attacks. This type of attack targets invalid assumptions that may be inherent in implementers of the protocol, incorrect implementations of the protocol, or vulnerabilities in the protocol itself. | ||||
Prerequisites | The protocol or implementations thereof must contain bugs that an adversary can exploit. | ||||
Solutions |