Category:Attack Categorisation By Attacker Model: Difference between revisions

From Single Sign-On Attacks
Jump to navigation Jump to search
No edit summary
No edit summary
Line 2: Line 2:
All of attacker models do not require the attacker to control the network communication.
All of attacker models do not require the attacker to control the network communication.
*Message Generation
*Message Generation
[[File:MA1.jpg|centre]]
[[File:MA1.jpg]]
*Access to Valid Token
*Access to Valid Token
*Web attacker
*Web attacker
<br>
<br>

Revision as of 20:22, 24 November 2015

This page lists three different attacker models. Each attacker type has different capabilities. All of attacker models do not require the attacker to control the network communication.

  • Message Generation

File:MA1.jpg

  • Access to Valid Token
  • Web attacker