This site is the archived OWASP Foundation Wiki and is no longer accepting Account Requests.
To view the new OWASP Foundation website, please visit https://owasp.org
Difference between revisions of "OWASP Automated Threats to Web Applications"
From OWASP
m (→Automated Threats) |
(→Introduction: Links to OAT wiki pages) |
||
Line 232: | Line 232: | ||
==Introduction== | ==Introduction== | ||
− | The list of [[:Category:Automated Threat|automated threat events]] and summary descriptions, defined in full in the [https://www.owasp.org/index.php/File:Automated-threat-handbook.pdf OWASP Automated Threat Handbook], is: | + | The A-Z list of [[:Category:Automated Threat|automated threat events]] and summary descriptions, defined in full in the [https://www.owasp.org/index.php/File:Automated-threat-handbook.pdf OWASP Automated Threat Handbook], is: |
{| cellpadding="2" | {| cellpadding="2" | ||
|- | |- | ||
| align="left" valign="top" | | | align="left" valign="top" | | ||
− | + | [[OAT-020 Account Aggregation]] | |
| align="left" valign="top" | | | align="left" valign="top" | | ||
Use by an intermediary application that collects together multiple accounts and interacts on their behalf. | Use by an intermediary application that collects together multiple accounts and interacts on their behalf. | ||
|- | |- | ||
| align="left" valign="top" | | | align="left" valign="top" | | ||
− | + | [[OAT-019 Account Creation]] | |
| align="left" valign="top" | | | align="left" valign="top" | | ||
Create multiple accounts for subsequent misuse. | Create multiple accounts for subsequent misuse. | ||
|- | |- | ||
| align="left" valign="top" | | | align="left" valign="top" | | ||
− | + | [[OAT-003 Ad Fraud]] | |
| align="left" valign="top" | | | align="left" valign="top" | | ||
False clicks and fraudulent display of web-placed advertisements. | False clicks and fraudulent display of web-placed advertisements. | ||
|- | |- | ||
| align="left" valign="top" | | | align="left" valign="top" | | ||
− | + | [[OAT-009 CAPTCHA Defeat]] | |
| align="left" valign="top" | | | align="left" valign="top" | | ||
Solve anti-automation tests. | Solve anti-automation tests. | ||
|- | |- | ||
| align="left" valign="top" | | | align="left" valign="top" | | ||
− | + | [[OAT-010 Card Cracking]] | |
| align="left" valign="top" | | | align="left" valign="top" | | ||
Identify missing start/expiry dates and security codes for stolen payment card data by trying different values. | Identify missing start/expiry dates and security codes for stolen payment card data by trying different values. | ||
|- | |- | ||
| align="left" valign="top" | | | align="left" valign="top" | | ||
− | + | [[OAT-001 Carding]] | |
| align="left" valign="top" | | | align="left" valign="top" | | ||
Multiple payment authorisation attempts used to verify the validity of bulk stolen payment card data. | Multiple payment authorisation attempts used to verify the validity of bulk stolen payment card data. | ||
|- | |- | ||
| align="left" valign="top" | | | align="left" valign="top" | | ||
− | + | [[OAT-012 Cashing Out]] | |
| align="left" valign="top" | | | align="left" valign="top" | | ||
Buy goods or obtain cash utilising validated stolen payment card or other user account data. | Buy goods or obtain cash utilising validated stolen payment card or other user account data. | ||
|- | |- | ||
| align="left" valign="top" | | | align="left" valign="top" | | ||
− | + | [[OAT-007 Credential Cracking]] | |
| align="left" valign="top" | | | align="left" valign="top" | | ||
Identify valid login credentials by trying different values for usernames and/or passwords. | Identify valid login credentials by trying different values for usernames and/or passwords. | ||
|- | |- | ||
| align="left" valign="top" | | | align="left" valign="top" | | ||
− | + | [[OAT-008 Credential Stuffing]] | |
| align="left" valign="top" | | | align="left" valign="top" | | ||
Mass log in attempts used to verify the validity of stolen username/password pairs. | Mass log in attempts used to verify the validity of stolen username/password pairs. | ||
|- | |- | ||
| align="left" valign="top" | | | align="left" valign="top" | | ||
− | + | [[OAT-021 Denial of Inventory]] | |
| align="left" valign="top" | | | align="left" valign="top" | | ||
Deplete goods or services stock without ever completing the purchase or committing to the transaction. | Deplete goods or services stock without ever completing the purchase or committing to the transaction. | ||
|- | |- | ||
| align="left" valign="top" | | | align="left" valign="top" | | ||
− | + | [[OAT-015 Denial of Service]] | |
| align="left" valign="top" | | | align="left" valign="top" | | ||
Target resources of the application and database servers, or individual user accounts, to achieve denial of service (DoS). | Target resources of the application and database servers, or individual user accounts, to achieve denial of service (DoS). | ||
|- | |- | ||
| align="left" valign="top" | | | align="left" valign="top" | | ||
− | + | [[OAT-006 Expediting]] | |
| align="left" valign="top" | | | align="left" valign="top" | | ||
Perform actions to hasten progress of usually slow, tedious or time-consuming actions. | Perform actions to hasten progress of usually slow, tedious or time-consuming actions. | ||
|- | |- | ||
| align="left" valign="top" | | | align="left" valign="top" | | ||
− | + | [[OAT-004 Fingerprinting]] | |
| align="left" valign="top" | | | align="left" valign="top" | | ||
Elicit information about the supporting software and framework types and versions. | Elicit information about the supporting software and framework types and versions. | ||
|- | |- | ||
| align="left" valign="top" | | | align="left" valign="top" | | ||
− | + | [[OAT-018 Footprinting]] | |
| align="left" valign="top" | | | align="left" valign="top" | | ||
Probe and explore application to identify its constituents and properties. | Probe and explore application to identify its constituents and properties. | ||
|- | |- | ||
| align="left" valign="top" | | | align="left" valign="top" | | ||
− | + | [[OAT-005 Scalping]] | |
| align="left" valign="top" | | | align="left" valign="top" | | ||
Obtain limited-availability and/or preferred goods/services by unfair methods. | Obtain limited-availability and/or preferred goods/services by unfair methods. | ||
|- | |- | ||
| align="left" valign="top" | | | align="left" valign="top" | | ||
− | + | [[OAT-011 Scraping]] | |
| align="left" valign="top" | | | align="left" valign="top" | | ||
Collect application content and/or other data for use elsewhere. | Collect application content and/or other data for use elsewhere. | ||
|- | |- | ||
| align="left" valign="top" | | | align="left" valign="top" | | ||
− | + | [[OAT-016 Skewing]] | |
| align="left" valign="top" | | | align="left" valign="top" | | ||
Repeated link clicks, page requests or form submissions intended to alter some metric. | Repeated link clicks, page requests or form submissions intended to alter some metric. | ||
|- | |- | ||
| align="left" valign="top" | | | align="left" valign="top" | | ||
− | + | [[OAT-013 Sniping]] | |
| align="left" valign="top" | | | align="left" valign="top" | | ||
Last minute bid or offer for goods or services. | Last minute bid or offer for goods or services. | ||
|- | |- | ||
| align="left" valign="top" | | | align="left" valign="top" | | ||
− | + | [[OAT-017 Spamming]] | |
| align="left" valign="top" | | | align="left" valign="top" | | ||
Malicious or questionable information addition that appears in public or private content, databases or user messages. | Malicious or questionable information addition that appears in public or private content, databases or user messages. | ||
|- | |- | ||
| align="left" valign="top" | | | align="left" valign="top" | | ||
− | + | [[OAT-002 Token Cracking]] | |
| align="left" valign="top" | | | align="left" valign="top" | | ||
Mass enumeration of coupon numbers, voucher codes, discount tokens, etc. | Mass enumeration of coupon numbers, voucher codes, discount tokens, etc. | ||
|- | |- | ||
| align="left" valign="top" | | | align="left" valign="top" | | ||
− | + | [[OAT-014 Vulnerability Scanning]] | |
| align="left" valign="top" | | | align="left" valign="top" | | ||
Crawl and fuzz application to identify weaknesses and possible vulnerabilities. | Crawl and fuzz application to identify weaknesses and possible vulnerabilities. |