| Home > CAPEC List > CAPEC-59: Session Credential Falsification through Prediction (Version 3.9) |
|
High
High
| Nature | Type | ID | Name |
|---|---|---|---|
| ChildOf | Standard Attack PatternStandard Attack Pattern - A standard level attack pattern in CAPEC is focused on a specific methodology or technique used in an attack. It is often seen as a singular piece of a fully executed attack. A standard attack pattern is meant to provide sufficient details to understand the specific technique and how it attempts to accomplish a desired goal. A standard level attack pattern is a specific type of a more abstract meta level attack pattern. | 196 | Session Credential Falsification through Forging |
| View Name | Top Level Categories |
|---|---|
| Domains of Attack | Software |
| Mechanisms of Attack | Subvert Access Control |
Find Session IDs: The attacker interacts with the target host and finds that session IDs are used to authenticate users.
| Techniques |
|---|
| An attacker makes many anonymous connections and records the session IDs assigned. |
| An attacker makes authorized connections and records the session tokens or credentials issued. |
Characterize IDs: The attacker studies the characteristics of the session ID (size, format, etc.). As a results the attacker finds that legitimate session IDs are predictable.
| Techniques |
|---|
| Cryptanalysis. The attacker uses cryptanalysis to determine if the session IDs contain any cryptographic protections. |
| Pattern tests. The attacker looks for patterns (odd/even, repetition, multiples, or other arithmetic relationships) between IDs |
| Comparison against time. The attacker plots or compares the issued IDs to the time they were issued to check for correlation. |
Match issued IDs: The attacker brute forces different values of session ID and manages to predict a valid session ID.
| Techniques |
|---|
| The attacker models the session ID algorithm enough to produce a compatible session IDs, or just one match. |
Use matched Session ID: The attacker uses the falsified session ID to access the target system.
| Techniques |
|---|
| The attacker loads the session ID into their web browser and browses to restricted data or functionality. |
| The attacker loads the session ID into their network communications and impersonates a legitimate user to gain access to data or functionality. |
| Scope | Impact | Likelihood |
|---|---|---|
Confidentiality Access Control Authorization | Gain Privileges |
| CWE-ID | Weakness Name |
|---|---|
| 290 | Authentication Bypass by Spoofing |
| 330 | Use of Insufficiently Random Values |
| 331 | Insufficient Entropy |
| 346 | Origin Validation Error |
| 488 | Exposure of Data Element to Wrong Session |
| 539 | Use of Persistent Cookies Containing Sensitive Information |
| 200 | Exposure of Sensitive Information to an Unauthorized Actor |
| 6 | J2EE Misconfiguration: Insufficient Session-ID Length |
| 285 | Improper Authorization |
| 384 | Session Fixation |
| 693 | Protection Mechanism Failure |
| Entry ID | Entry Name |
|---|---|
| 18 | Credential/Session Prediction |
| Entry Name |
|---|
| Session Prediction |
| Submissions | ||
|---|---|---|
| Submission Date | Submitter | Organization |
| 2014年06月23日 (Version 2.6) | CAPEC Content Team | The MITRE Corporation |
| Modifications | ||
| Modification Date | Modifier | Organization |
| 2017年08月04日 (Version 2.11) | CAPEC Content Team | The MITRE Corporation |
| Updated Related_Attack_Patterns | ||
| 2020年07月30日 (Version 3.3) | CAPEC Content Team | The MITRE Corporation |
| Updated Execution_Flow | ||
| 2020年12月17日 (Version 3.4) | CAPEC Content Team | The MITRE Corporation |
| Updated Taxonomy_Mappings | ||
| 2021年06月24日 (Version 3.5) | CAPEC Content Team | The MITRE Corporation |
| Updated Related_Weaknesses | ||
|
Use of the Common Attack Pattern Enumeration and Classification (CAPEC), and the associated references from this website are subject to the Terms of Use. Copyright © 2007–2025, The MITRE Corporation. CAPEC and the CAPEC logo are trademarks of The MITRE Corporation. |
||