This site is the archived OWASP Foundation Wiki and is no longer accepting Account Requests.
To view the new OWASP Foundation website, please visit https://owasp.org

Difference between revisions of "OAT-002 Token Cracking"

From OWASP
Jump to: navigation, search
(New page)
 
(Indicative Diagram)
 
(2 intermediate revisions by the same user not shown)
Line 19: Line 19:
 
===Indicative Diagram===
 
===Indicative Diagram===
  
 
+
[[File:OAT-002_Token_Cracking.png|500px|link=]]
  
 
=== Description ===
 
=== Description ===
Line 44: Line 44:
 
* 210 Abuse of Functionality
 
* 210 Abuse of Functionality
  
=== CWE Base / Class / Variant IDS ===
+
=== CWE Base / Class / Variant IDs ===
  
 
* 799 Improper Control of Interaction Frequency
 
* 799 Improper Control of Interaction Frequency
 
* 837 Improper Enforcement of a Single, Unique Action
 
* 837 Improper Enforcement of a Single, Unique Action
  
=== WASC Threat IDS ===
+
=== WASC Threat IDs ===
  
 
* 11 Brute Force
 
* 11 Brute Force
Line 58: Line 58:
  
 
* [[:Category:Abuse of Functionality|Abuse of Functionality]]
 
* [[:Category:Abuse of Functionality|Abuse of Functionality]]
* [[:Category:Brute Force Attack|Brute Force Attack]]
+
* [[Brute force attack|Brute Force Attack]]
  
  
 
[[Category: Automated Threat]]
 
[[Category: Automated Threat]]

Latest revision as of 15:03, 16 February 2018


This is an automated threat. To view all automated threats, please see the Automated Threat Category page. The OWASP Automated Threat Handbook - Wed Applications (pdf, print), an output of the OWASP Automated Threats to Web Applications Project, provides a fuller guide to each threat, detection methods and countermeasures. The threat identification chart helps to correctly identify the automated threat.

Definition

OWASP Automated Threat (OAT) Identity Number

OAT-002

Threat Event Name

Token Cracking

Summary Defining Characteristics

Mass enumeration of coupon numbers, voucher codes, discount tokens, etc.

Indicative Diagram

OAT-002 Token Cracking.png

Description

Identification of valid token codes providing some form of user benefit within the application. The benefit may be a cash alternative, a non-cash credit, a discount, or an opportunity such as access to a limited offer.

For cracking of usernames, see OAT-007 Credential Cracking instead.

Other Names and Examples

Coupon guessing; Voucher, gift card and discount enumeration

See Also

Cross-References

CAPEC Category / Attack Pattern IDs

  • 112 Brute Force
  • 210 Abuse of Functionality

CWE Base / Class / Variant IDs

  • 799 Improper Control of Interaction Frequency
  • 837 Improper Enforcement of a Single, Unique Action

WASC Threat IDs

  • 11 Brute Force
  • 21 Insfficient Anti-Automation
  • 42 Abuse of Functionality

OWASP Attack Category / Attack IDs