An attacker initiates a resource depletion attack where a large number of small XML messages are delivered at a sufficiently rapid rate to cause a denial of service or crash of the target. Transactions such as repetitive SOAP transactions can deplete resources faster than a simple flooding attack because of the additional resources used by the SOAP protocol and the resources necessary to process SOAP messages. The transactions used are immaterial as long as they cause resource utilization on the target. In other words, this is a normal flooding attack augmented by using messages that will require extra processing on the target.
Description
Attack Execution Flow
Step 1
Explore[Survey the target] Using a browser or an automated tool, an attacker records all instance of web services to process XML requests.
Use an automated tool to record all instances of URLs to process XML requests.
Use a browser to manually explore the website and analyze how the application processes XML requests.
[Survey the target] Utilizzando un browser o uno strumento automatizzato, un attaccante registra tutte le istanze di servizi web per elaborare richieste XML.
Utilizza uno strumento automatizzato per registrare tutte le istanze di URL per elaborare richieste XML.
Utilizza un browser per esplorare manualmente il sito web e analizzare come l'applicazione elabora le richieste XML.
Attack Techniques
-
Use an automated tool to record all instances of URLs to process XML requests.
-
Use a browser to manually explore the website and analyze how the application processes XML requests.IT: Utilizza uno strumento automatizzato per registrare tutte le istanze di URL al fine di elaborare le richieste XML.
Step 2
Exploit[Launch a resource depletion attack] The attacker delivers a large number of small XML messages to the target URLs found in the explore phase at a sufficiently rapid rate. It causes denial of service to the target application.
Send a large number of crafted small XML messages to the target URL.
[Lancia un attacco di esaurimento delle risorse] L'attaccante invia un gran numero di piccoli messaggi XML al target URL individuati nella fase di esplorazione, a una velocità sufficientemente elevata. Ciò provoca un denial of service all'applicazione target.
Invia un gran numero di piccoli messaggi XML appositamente creati al target URL.
Attack Techniques
-
Send a large number of crafted small XML messages to the target URL.