Difference between revisions of "Account lockout attack"

From OWASP
Jump to: navigation, search
(adjustments to new template)
(Reverting to last version not containing links to s1.shard.jp)
(34 intermediate revisions by 5 users not shown)
Line 1: Line 1:
 
{{Template:Attack}}
 
{{Template:Attack}}
 +
<br>
 +
[[Category:OWASP ASDR Project]]
  
 
Last revision (mm/dd/yy): '''{{REVISIONMONTH}}/{{REVISIONDAY}}/{{REVISIONYEAR}}'''
 
Last revision (mm/dd/yy): '''{{REVISIONMONTH}}/{{REVISIONDAY}}/{{REVISIONYEAR}}'''
Line 5: Line 7:
 
==Description==
 
==Description==
  
In an account lockout attack, the attacker attempts to lockout all user accounts, typically by failing login more times than the threshold defined by the authentication system. For example, if users are locked out of their accounts after three failed login attempts, an attacker can lock out their account for them simply by failing login three times. This attack can result in a large scale denial of service attack if all user accounts are locked out, especially if the amount of work required to reset the accounts is signficant.
+
In an account lockout attack, the attacker attempts to lock out all user accounts, typically by failing login more times than the threshold defined by the authentication system. For example, if users are locked out of their accounts after three failed login attempts, an attacker can lock out their account for them simply by failing login three times. This attack can result in a large scale denial of service attack if all user accounts are locked out, especially if the amount of work required to reset the accounts is signficant.
 
+
  
 
==Risk Factors==
 
==Risk Factors==
 
+
TBD
 
+
  
 
==Examples ==
 
==Examples ==
  
===eBay`s atack===
+
===eBay attack===
:Account lockout attacks are used to exploit authentication systems that are susceptible to denial of service. A famous example of this type of attack is the eBay`s one. eBay always displays the user id of the highest bidder.  In the final minutes of the auction, one of the bidders could try to log in as the highest bidder three times. After three incorrect log in attempts, eBay password throttling would kick in and lock out the highest bidder's account for some time.  An attacker could then make their own bid and their victim would not have a chance to place the counter bid because they would be locked out. Thus an attacker could win the auction.
+
:Account lockout attacks are used to exploit authentication systems that are susceptible to denial of service. A famous example of this type of attack is eBay's. eBay used to display the user id of the highest bidder (in the meantime they changed their way of working).  In the final minutes of the auction, one of the bidders could try to log in as the highest bidder three times. After three incorrect log in attempts, eBay password throttling would kick in and lock out the highest bidder's account for some time.  An attacker could then make their own bid and their victim would not have a chance to place a counter bid because they would be locked out. Thus an attacker could win the auction.
 
+
  
 
==Related [[Threat Agents]]==
 
==Related [[Threat Agents]]==
 
 
* [[:Category:Authentication]]
 
* [[:Category:Authentication]]
 
  
 
==Related [[Attacks]]==
 
==Related [[Attacks]]==
 
+
* [[Brute force attack]]
* [[Brute_force_attack]]
+
 
+
  
 
==Related [[Vulnerabilities]]==
 
==Related [[Vulnerabilities]]==
 
+
TBD
 
+
  
 
==Related [[Controls]]==
 
==Related [[Controls]]==
 
+
* [[Authentication]]
Build authentication mechanism, which will block account after N tries for a given IP address, from which log in attempt was conducted.
+
 
+
To minimize possibility of blocking owner`s account we may take under consideration other characteristics like User-Agent or X_FORWARDED_FOR (if it's present).
+
 
+
Moreover after N login attempts, but before blocking the account,we may include additional verification by comparing data entered by
+
the user and data displayed to him/her on the picture (CAPTCHA).
+
 
+
Such approach should slow down, limit log in attempts only to the valid user or even prevent conducting unwanted attempts generally.
+
 
+
  
 
==References==
 
==References==
 +
TBD
  
 
+
[[Category:Abuse of Functionality]]
 
+
[[Category:Exploitation of Authentication]]
==Categories==
+
[[Category: Attack]]
 
+
[[Category:Abuse_of_Functionality]]
+
[[Category:Attack]]
+

Revision as of 07:50, 3 June 2009

This is an Attack. To view all attacks, please see the Attack Category page.



Last revision (mm/dd/yy): 06/3/2009

Description

In an account lockout attack, the attacker attempts to lock out all user accounts, typically by failing login more times than the threshold defined by the authentication system. For example, if users are locked out of their accounts after three failed login attempts, an attacker can lock out their account for them simply by failing login three times. This attack can result in a large scale denial of service attack if all user accounts are locked out, especially if the amount of work required to reset the accounts is signficant.

Risk Factors

TBD

Examples

eBay attack

Account lockout attacks are used to exploit authentication systems that are susceptible to denial of service. A famous example of this type of attack is eBay's. eBay used to display the user id of the highest bidder (in the meantime they changed their way of working). In the final minutes of the auction, one of the bidders could try to log in as the highest bidder three times. After three incorrect log in attempts, eBay password throttling would kick in and lock out the highest bidder's account for some time. An attacker could then make their own bid and their victim would not have a chance to place a counter bid because they would be locked out. Thus an attacker could win the auction.

Related Threat Agents

Related Attacks

Related Vulnerabilities

TBD

Related Controls

References

TBD