Difference between revisions of "Early Amplification"

From OWASP
Jump to: navigation, search
 
Line 15: Line 15:
  
 
==Related Vulnerabilities==
 
==Related Vulnerabilities==
 +
 
[[Lack of Authentication]]
 
[[Lack of Authentication]]
 +
 
[[Lack of Access Control]]
 
[[Lack of Access Control]]
  
 
==Related Countermeasures==
 
==Related Countermeasures==
 +
 
[[:Category:Authentication]]
 
[[:Category:Authentication]]
 +
 
[[:Category:Access Control]]
 
[[:Category:Access Control]]
  

Revision as of 12:21, 9 June 2006

This is a Vulnerability. To view all vulnerabilities, please see the Vulnerability Category page.


Description

Allows a legitimatebut expensive operation before the entity has proven that the operation should be allowed.

PLOVER Early Amplification.

Examples

Related Threats

  • Attackers try to launch a denial of service attack by performing the unprotected expensive operations repeatly

Related Attacks

Denial of Service

Related Vulnerabilities

Lack of Authentication

Lack of Access Control

Related Countermeasures

Category:Authentication

Category:Access Control

Categories

This article is a stub. You can help OWASP by expanding it or discussing it on its Talk page.