CAPEC 295 Timestamp Request

Stable Detailed Unknown Risk
Severity Low

Description

This pattern of attack leverages standard requests to learn the exact time associated with a target system. An adversary may be able to use the timestamp returned from the target to attack time-based security algorithms, such as random number generators, or time-based authentication mechanisms.

Consequences

Relationships

Related ATT&CK Techniques

1

Resources Required

1