Difference between revisions of "Adaptive Chosen-Ciphertext Attacks"

From WS-Attacks
Jump to: navigation, search
m (1 revision imported: Import from WS-Attacks)
(Attack description)
Line 1: Line 1:
 
=Attack description=
 
=Attack description=
  
 
+
TBD
  
 
=Attack subtypes=
 
=Attack subtypes=

Revision as of 11:47, 23 December 2015

Attack description

TBD

Attack subtypes

There are 2 attack subtypes.


Prerequisites for attack

The following prerequisites are needed to execute the attacks:

  1. Attacker can reach endpoint from its location.
  2. Attacker is in possession of an encrypted SOAP message.
  3. Attacker can modify the ciphertext inside the message and this modification is not rejected by the server. This means the ciphertext is not signed or the attacker can execute further attacks (e.g. XML Signature Wrapping) to modify the signed ciphertext.
  4. The server responds with 1 or 0 according to the validity of the decrypted message. The different messages can for example be a result of incorrect decryption processing or parsing of the decrypted message.


Graphical representation of attack

The attack targets the decryption component of a Web Service, in combination with the application logic (if the ciphertext is correctly decrypted, the attacker can get information based on the error messages coming from the application logic).

AttackedComponent None.png

  • Red = attacked web service component
  • Black = location of attacker
  • Blue = web service component not directly involved in attack.

Attack example

Attack mitigation / countermeasures

Attack categorisation

Categorisation by violated security objective

Categorisation by number of involved parties

[[Category:Attack_Categorisation_By_Number_Of_Involved_Parties]

Categorisation by attacked component in web service architecture

Categorisation by attack spreading


References