Adaptive Chosen-Ciphertext Attacks

From WS-Attacks
Revision as of 12:26, 31 October 2015 by Jln7bp (talk | contribs) (1 revision imported: Import from WS-Attacks)
Jump to: navigation, search

Attack description

Attack subtypes

There are 2 attack subtypes.


Prerequisites for attack

The following prerequisites are needed to execute the attacks:

  1. Attacker can reach endpoint from its location.
  2. Attacker is in possession of an encrypted SOAP message.
  3. Attacker can modify the ciphertext inside the message and this modification is not rejected by the server. This means the ciphertext is not signed or the attacker can execute further attacks (e.g. XML Signature Wrapping) to modify the signed ciphertext.
  4. The server responds with 1 or 0 according to the validity of the decrypted message. The different messages can for example be a result of incorrect decryption processing or parsing of the decrypted message.


Graphical representation of attack

The attack targets the decryption component of a Web Service, in combination with the application logic (if the ciphertext is correctly decrypted, the attacker can get information based on the error messages coming from the application logic).

AttackedComponent None.png

  • Red = attacked web service component
  • Black = location of attacker
  • Blue = web service component not directly involved in attack.

Attack example

Attack mitigation / countermeasures

Attack categorisation

Categorisation by violated security objective

Categorisation by number of involved parties

[[Category:Attack_Categorisation_By_Number_Of_Involved_Parties]

Categorisation by attacked component in web service architecture

Categorisation by attack spreading


References