Prerrequisitos
The protocol or implementations thereof must contain bugs that an adversary can exploit.
Recursos requeridos
In some variants of this attack the adversary must be able to intercept communications using the protocol. This means they need to be able to receive the communications from one participant and prevent the other participant from receiving these communications.
Envío
| Nombre |
Organización |
Fecha |
Fecha de lanzamiento |
| CAPEC Content Team |
The MITRE Corporation |
2014-06-23 +00:00 |
|