CAPEC-31: Accessing/Intercepting/Modifying HTTP Cookies

Description
This attack relies on the use of HTTP Cookies to store credentials, state information and other critical data on client systems. There are several different forms of this attack. The first form of this attack involves accessing HTTP Cookies to mine for potentially sensitive data contained therein. The second form involves intercepting this data as it is transmitted from client to server. This intercepted information is then used by the adversary to impersonate the remote user/session. The third form is when the cookie's content is modified by the adversary before it is sent back to the server. Here the adversary seeks to convince the target server to operate on this falsified information.
Extended Description

During a UDP scan, a datagram is sent to a target port. If an 'ICMP Type 3 Port unreachable' error message is returned then the port is considered closed. Different types of ICMP messages can indicate a filtered port. UDP scanning is slower than TCP scanning. The protocol characteristics of UDP make port scanning inherently more difficult than with TCP, as well as dependent upon ICMP for accurate scanning. Due to ambiguities that can arise between open ports and filtered ports, UDP scanning results often require a high degree of interpretation and further testing to refine. In general, UDP scanning results are less reliable or accurate than TCP-based scanning.

Severity :

High

Possibility :

High

Type :

Detailed
Relationships with other CAPECs

This table shows the other attack patterns and high level categories that are related to this attack pattern.

Prerequisites

This table shows the other attack patterns and high level categories that are related to this attack pattern.

  • Target server software must be a HTTP daemon that relies on cookies.
  • The cookies must contain sensitive information.
  • The adversary must be able to make HTTP requests to the server, and the cookie must be contained in the reply.
Skills required

This table shows the other attack patterns and high level categories that are related to this attack pattern.

  • Low To overwrite session cookie data, and submit targeted attacks via HTTP
  • High Exploiting a remote buffer overflow generated by attack
Taxonomy mappings

Mappings to ATT&CK, OWASP and other frameworks.

Resources required

A utility that allows for the viewing and modification of cookies. Many modern web browsers support this behavior.

Visit http://capec.mitre.org/ for more details.