Difference between revisions of "Account lockout attack"

From OWASP
Jump to: navigation, search
(Related Controls)
(Related Vulnerabilities)
Line 30: Line 30:
 
==Related [[Vulnerabilities]]==
 
==Related [[Vulnerabilities]]==
 
[[Category:FIXME|any links here?]]
 
[[Category:FIXME|any links here?]]
 +
TBD
  
 
==Related [[Controls]]==
 
==Related [[Controls]]==

Revision as of 16:13, 12 September 2008

This is an Attack. To view all attacks, please see the Attack Category page.



ASDR Table of Contents

Contents


Last revision (mm/dd/yy): 09/12/2008

Description

In an account lockout attack, the attacker attempts to lock out all user accounts, typically by failing login more times than the threshold defined by the authentication system. For example, if users are locked out of their accounts after three failed login attempts, an attacker can lock out their account for them simply by failing login three times. This attack can result in a large scale denial of service attack if all user accounts are locked out, especially if the amount of work required to reset the accounts is signficant.

Risk Factors

TBD

Examples

eBay attack

Account lockout attacks are used to exploit authentication systems that are susceptible to denial of service. A famous example of this type of attack is eBay's. eBay always displays the user id of the highest bidder. In the final minutes of the auction, one of the bidders could try to log in as the highest bidder three times. After three incorrect log in attempts, eBay password throttling would kick in and lock out the highest bidder's account for some time. An attacker could then make their own bid and their victim would not have a chance to place a counter bid because they would be locked out. Thus an attacker could win the auction.

Related Threat Agents

Related Attacks

Related Vulnerabilities

TBD

Related Controls

References

TBD