CAPEC 57 Utilizing REST's Trust in the System Resource to Obtain Sensitive Data

Draft Detailed Medium Risk
Severity Very High

Description

This attack utilizes a REST(REpresentational State Transfer)-style applications' trust in the system resources and environment to obtain sensitive data once SSL is terminated.

Attack Execution Flow

3

Mitigations

3

Consequences

Relationships

Related ATT&CK Techniques

1