CAPEC-295

Timestamp Request
Baixa
Stable
2014-06-23
00h00 +00:00
2019-09-30
00h00 +00:00
Alerta para um CAPEC
Fique informado sobre quaisquer alterações para um CAPEC específico.
Gerenciar notificações

Descrições CAPEC

This pattern of attack leverages standard requests to learn the exact time associated with a target system. An adversary may be able to use the timestamp returned from the target to attack time-based security algorithms, such as random number generators, or time-based authentication mechanisms.

Informações CAPEC

Pré-requisitos

The ability to send a timestamp request to a remote target and receive a response.

Recursos Necessários

Scanners or utilities that provide the ability to send custom ICMP queries.

Fraquezas Relacionadas

CWE-ID Nome da Fraqueza

CWE-200

Exposure of Sensitive Information to an Unauthorized Actor
The product exposes sensitive information to an actor that is not explicitly authorized to have access to that information.

Referências

REF-33

Hacking Exposed: Network Security Secrets & Solutions
Stuart McClure, Joel Scambray, George Kurtz.

REF-123

RFC792 - Internet Control Messaging Protocol
J. Postel.
http://www.faqs.org/rfcs/rfc792.html

REF-124

RFC1122 - Requirements for Internet Hosts - Communication Layers
R. Braden, Ed..
http://www.faqs.org/rfcs/rfc1122.html

REF-125

Host Discovery with Nmap
Mark Wolfgang.
http://nmap.org/docs/discovery.pdf

REF-147

Nmap Network Scanning: The Official Nmap Project Guide to Network Discovery and Security Scanning
Gordon "Fyodor" Lyon.

Submissão

Nome Organização Data Data de lançamento
CAPEC Content Team The MITRE Corporation 2014-06-23 +00:00

Modificações

Nome Organização Data Comentário
CAPEC Content Team The MITRE Corporation 2017-08-04 +00:00 Updated Description Summary, Resources_Required
CAPEC Content Team The MITRE Corporation 2018-07-31 +00:00 Updated Attack_Prerequisites, Description Summary, Examples-Instances, References, Related_Weaknesses
CAPEC Content Team The MITRE Corporation 2019-09-30 +00:00 Updated Related_Attack_Patterns