Difference between revisions of "OAT-002 Token Cracking"

From OWASP
Jump to: navigation, search
(New page)
 
(OWASP Attack Category / Attack IDs)
Line 58: Line 58:
  
 
* [[:Category:Abuse of Functionality|Abuse of Functionality]]
 
* [[:Category:Abuse of Functionality|Abuse of Functionality]]
* [[:Category:Brute Force Attack|Brute Force Attack]]
+
* [[Brute force attack|Brute Force Attack]]
  
  
 
[[Category: Automated Threat]]
 
[[Category: Automated Threat]]

Revision as of 04:00, 16 February 2018


This is an automated threat. To view all automated threats, please see the Automated Threat Category page. The OWASP Automated Threat Handbook - Wed Applications (pdf, print), an output of the OWASP Automated Threats to Web Applications Project, provides a fuller guide to each threat, detection methods and countermeasures. The threat identification chart helps to correctly identify the automated threat.

Definition

OWASP Automated Threat (OAT) Identity Number

OAT-002

Threat Event Name

Token Cracking

Summary Defining Characteristics

Mass enumeration of coupon numbers, voucher codes, discount tokens, etc.

Indicative Diagram

Description

Identification of valid token codes providing some form of user benefit within the application. The benefit may be a cash alternative, a non-cash credit, a discount, or an opportunity such as access to a limited offer.

For cracking of usernames, see OAT-007 Credential Cracking instead.

Other Names and Examples

Coupon guessing; Voucher, gift card and discount enumeration

See Also

Cross-References

CAPEC Category / Attack Pattern IDs

  • 112 Brute Force
  • 210 Abuse of Functionality

CWE Base / Class / Variant IDS

  • 799 Improper Control of Interaction Frequency
  • 837 Improper Enforcement of a Single, Unique Action

WASC Threat IDS

  • 11 Brute Force
  • 21 Insfficient Anti-Automation
  • 42 Abuse of Functionality

OWASP Attack Category / Attack IDs