CAPEC CAPEC-115: Authentication Bypass (Version 3.9) (2024)

CAPEC-115: Authentication Bypass

Attack Pattern ID: 115

Abstraction: Meta

View customized information:

Description

An attacker gains access to application, service, or device with the privileges of an authorized or privileged user by evading or circumventing an authentication mechanism. The attacker is therefore able to access protected data without authentication ever having taken place.

Extended Description

This refers to an attacker gaining access equivalent to an authenticated user without ever going through an authentication procedure. This is usually the result of the attacker using an unexpected access procedure that does not go through the proper checkpoints where authentication should occur. For example, a web site might assume that all users will click through a given link in order to get to secure material and simply authenticate everyone that clicks the link. However, an attacker might be able to reach secured web content by explicitly entering the path to the content rather than clicking through the authentication link, thereby avoiding the check entirely. This attack pattern differs from other authentication attacks in that attacks of this pattern avoid authentication entirely, rather than faking authentication by exploiting flaws or by stealing credentials from legitimate users.

Relationships

CAPEC CAPEC-115: Authentication Bypass (Version 3.9) (1)This table shows the other attack patterns and high level categories that are related to this attack pattern. These relationships are defined as ChildOf and ParentOf, and give insight to similar items that may exist at higher and lower levels of abstraction. In addition, relationships such as CanFollow, PeerOf, and CanAlsoBe are defined to show similar attack patterns that the user may want to explore.

NatureTypeIDName
ParentOfCAPEC CAPEC-115: Authentication Bypass (Version 3.9) (2)Standard Attack Pattern - A standard level attack pattern in CAPEC is focused on a specific methodology or technique used in an attack. It is often seen as a singular piece of a fully executed attack. A standard attack pattern is meant to provide sufficient details to understand the specific technique and how it attempts to accomplish a desired goal. A standard level attack pattern is a specific type of a more abstract meta level attack pattern.87Forceful Browsing
ParentOfCAPEC CAPEC-115: Authentication Bypass (Version 3.9) (3)Standard Attack Pattern - A standard level attack pattern in CAPEC is focused on a specific methodology or technique used in an attack. It is often seen as a singular piece of a fully executed attack. A standard attack pattern is meant to provide sufficient details to understand the specific technique and how it attempts to accomplish a desired goal. A standard level attack pattern is a specific type of a more abstract meta level attack pattern.461Web Services API Signature Forgery Leveraging Hash Function Extension Weakness
ParentOfCAPEC CAPEC-115: Authentication Bypass (Version 3.9) (4)Standard Attack Pattern - A standard level attack pattern in CAPEC is focused on a specific methodology or technique used in an attack. It is often seen as a singular piece of a fully executed attack. A standard attack pattern is meant to provide sufficient details to understand the specific technique and how it attempts to accomplish a desired goal. A standard level attack pattern is a specific type of a more abstract meta level attack pattern.480Escaping Virtualization
ParentOfCAPEC CAPEC-115: Authentication Bypass (Version 3.9) (5)Standard Attack Pattern - A standard level attack pattern in CAPEC is focused on a specific methodology or technique used in an attack. It is often seen as a singular piece of a fully executed attack. A standard attack pattern is meant to provide sufficient details to understand the specific technique and how it attempts to accomplish a desired goal. A standard level attack pattern is a specific type of a more abstract meta level attack pattern.664Server Side Request Forgery
ParentOfCAPEC CAPEC-115: Authentication Bypass (Version 3.9) (6)Standard Attack Pattern - A standard level attack pattern in CAPEC is focused on a specific methodology or technique used in an attack. It is often seen as a singular piece of a fully executed attack. A standard attack pattern is meant to provide sufficient details to understand the specific technique and how it attempts to accomplish a desired goal. A standard level attack pattern is a specific type of a more abstract meta level attack pattern.668Key Negotiation of Bluetooth Attack (KNOB)
CanFollowCAPEC CAPEC-115: Authentication Bypass (Version 3.9) (7)Detailed Attack Pattern - A detailed level attack pattern in CAPEC provides a low level of detail, typically leveraging a specific technique and targeting a specific technology, and expresses a complete execution flow. Detailed attack patterns are more specific than meta attack patterns and standard attack patterns and often require a specific protection mechanism to mitigate actual attacks. A detailed level attack pattern often will leverage a number of different standard level attack patterns chained together to accomplish a goal.33HTTP Request Smuggling
CanFollowCAPEC CAPEC-115: Authentication Bypass (Version 3.9) (8)Detailed Attack Pattern - A detailed level attack pattern in CAPEC provides a low level of detail, typically leveraging a specific technique and targeting a specific technology, and expresses a complete execution flow. Detailed attack patterns are more specific than meta attack patterns and standard attack patterns and often require a specific protection mechanism to mitigate actual attacks. A detailed level attack pattern often will leverage a number of different standard level attack patterns chained together to accomplish a goal.34HTTP Response Splitting
CanFollowCAPEC CAPEC-115: Authentication Bypass (Version 3.9) (9)Detailed Attack Pattern - A detailed level attack pattern in CAPEC provides a low level of detail, typically leveraging a specific technique and targeting a specific technology, and expresses a complete execution flow. Detailed attack patterns are more specific than meta attack patterns and standard attack patterns and often require a specific protection mechanism to mitigate actual attacks. A detailed level attack pattern often will leverage a number of different standard level attack patterns chained together to accomplish a goal.105HTTP Request Splitting
CanFollowCAPEC CAPEC-115: Authentication Bypass (Version 3.9) (10)Detailed Attack Pattern - A detailed level attack pattern in CAPEC provides a low level of detail, typically leveraging a specific technique and targeting a specific technology, and expresses a complete execution flow. Detailed attack patterns are more specific than meta attack patterns and standard attack patterns and often require a specific protection mechanism to mitigate actual attacks. A detailed level attack pattern often will leverage a number of different standard level attack patterns chained together to accomplish a goal.273HTTP Response Smuggling

CAPEC CAPEC-115: Authentication Bypass (Version 3.9) (11)This table shows the views that this attack pattern belongs to and top level categories within that view.

View NameTop Level Categories
Domains of AttackSoftware
Mechanisms of AttackSubvert Access Control

Prerequisites

An authentication mechanism or subsystem implementing some form of authentication such as passwords, digest authentication, security certificates, etc.

Resources Required

A client application, such as a web browser, or a scripting language capable of interacting with the target.

Related Weaknesses

CAPEC CAPEC-115: Authentication Bypass (Version 3.9) (12)A Related Weakness relationship associates a weakness with this attack pattern. Each association implies a weakness that must exist for a given attack to be successful. If multiple weaknesses are associated with the attack pattern, then any of the weaknesses (but not necessarily all) may be present for the attack to be successful. Each related weakness is identified by a CWE identifier.

CWE-IDWeakness Name
287Improper Authentication

Taxonomy Mappings

CAPEC CAPEC-115: Authentication Bypass (Version 3.9) (13)CAPEC mappings to ATT&CK techniques leverage an inheritance model to streamline and minimize direct CAPEC/ATT&CK mappings. Inheritance of a mapping is indicated by text stating that the parent CAPEC has relevant ATT&CK mappings. Note that the ATT&CK Enterprise Framework does not use an inheritance model as part of the mapping to CAPEC.

Relevant to the ATT&CK taxonomy mapping

Entry IDEntry Name
1548Abuse Elevation Control Mechanism

References

[REF-598] "OWASP Web Security Testing Guide". Testing for Bypassing Authentication Schema. The Open Web Application Security Project (OWASP). <https://owasp.org/www-project-web-security-testing-guide/latest/4-Web_Application_Security_Testing/04-Authentication_Testing/04-Testing_for_Bypassing_Authentication_Schema.html>.

Content History

Submissions
Submission DateSubmitterOrganization
2014-06-23

(Version 2.6)

CAPEC Content TeamThe MITRE Corporation
Modifications
Modification DateModifierOrganization
2015-11-09

(Version 2.7)

CAPEC Content TeamThe MITRE Corporation
Updated Related_Attack_Patterns
2017-08-04

(Version 2.11)

CAPEC Content TeamThe MITRE Corporation
Updated Related_Weaknesses
2020-12-17

(Version 3.4)

CAPEC Content TeamThe MITRE Corporation
Updated References
2021-06-24

(Version 3.5)

CAPEC Content TeamThe MITRE Corporation
Updated Taxonomy_Mappings
2022-02-22

(Version 3.7)

CAPEC Content TeamThe MITRE Corporation
Updated Description, Extended_Description

More information is available — Please select a different filter.

CAPEC 

                CAPEC-115: Authentication Bypass                (Version 3.9) (2024)

FAQs

How authentication is bypassed by attackers? ›

Common methods include: Circumventing the login page by instead calling an internal page directly (forced browsing). Tampering with requests so that the application assumes the attacker has been authenticated. Attackers may do this by modifying an URL's parameter or manipulating a form, for example.

What is authentication bypass? ›

This refers to an attacker gaining access equivalent to an authenticated user without ever going through an authentication procedure. This is usually the result of the attacker using an unexpected access procedure that does not go through the proper checkpoints where authentication should occur.

Which of the following results in authentication bypass? ›

Answer & Explanation. The correct choice that leads to bypassing verification processes is the one related to weak security codes.

What is capec in cyber security? ›

Common Attack Pattern Enumeration and Classification.

Can hackers bypass the authenticator app? ›

Use authenticator apps

Most 2FA methods involve sending temporary codes via SMS or emails, but these can be easily intercepted by hackers through account takeover, SIM swapping, and/or MitM attacks.

What type of malware allows an attacker to bypass authentication? ›

The type of malware that allows an attacker to bypass authentication and gain access to a system is often referred to as a rootkit.

How do I authenticate a user without a password? ›

What are the Types of Passwordless Authentication?
  1. Biometrics: Physical traits, like fingerprint or retina scans, and behavioral traits, like typing and touch screen dynamics, are used to uniquely identify a person. ...
  2. Possession factors: Authentication via something that a user owns or carries with them.

What is an activation lock bypass code? ›

An MDM Activation Lock bypass code is a cryptographic key code generated during the deployment of managed Apple devices through an MDM. This bypass code can clear the device's activation lock without the Apple ID and password.

What bypasses normal authentication? ›

A backdoor is a typically covert method of bypassing normal authentication or encryption in a computer, product, embedded device (e.g. a home router), or its embodiment (e.g. part of a cryptosystem, algorithm, chipset, or even a "homunculus computer"—a tiny computer-within-a-computer such as that found in Intel's AMT ...

What is the correct method to pass authentication? ›

The list below reviews some common authentication methods used to secure modern systems.
  1. Password-based authentication. Passwords are the most common methods of authentication. ...
  2. Multi-factor authentication. ...
  3. Certificate-based authentication. ...
  4. Biometric authentication. ...
  5. Token-based authentication.

What is the difference between authentication and authorization bypass? ›

What is the difference between authentication and authorization? Authentication is the process of verifying that a user is who they claim to be. Authorization involves verifying whether a user is allowed to do something.

What is broken access control? ›

Broken access control vulnerability is a security flaw that allows unauthorized users to access, modify, or delete data they shouldn't have access to.

What would you use CAPEC for? ›

Penetration Testing Management Platform for security teams

CAPEC helps engineers and business understand the real context of vulnerabilities and attack patterns. By utilizing CAPEC, AttackForge pen testers are reducing time required to register a vulnerability and reporting, whilst increasing the quality of the output.

What does a CAPEC entry contain? ›

CAPEC entries are related to Common Weakness Enumeration (CWE™) and Common Vulnerabilities and Exposures (CVE®). The differences between Adversarial Tactics, Techniques & Common Knowledge (ATT&CK™), another related corpus, and CAPEC are discussed here.

What is blackholing in cyber security? ›

Blackholing involves redirecting traffic to a “black hole” or null route, which drops all traffic to the targeted IP address or range. This technique is used to prevent malicious traffic from reaching the targeted network or system during a DDoS attack.

How is broken authentication exploited? ›

Attackers exploit weak or reused passwords through various methods like phishing attacks, credential stuffing, or brute force attacks. Phishing attacks trick users into revealing their passwords, while credential stuffing uses previously leaked credentials to gain unauthorized access.

What is the method that bypasses the normal authentication process for a given system? ›

Backdoors provide us with a method of bypassing the normal authentication process for a given system.

How can attackers access a user account protected by two-factor authentication? ›

  • The man in the middle: 2FA theft through phishing. ...
  • Man in the browser: Malware as a man in the middle. ...
  • Personal contact: You are being tricked out of your code. ...
  • SIM swapping: Attackers steal your SIM card. ...
  • Malware steals authentication cookies. ...
  • Insecure factors as an alternative when logging in. ...
  • One-time passwords.
Sep 11, 2024

How do attackers gain unauthorized access? ›

There are several common scenarios of gaining unauthorized access, from hacking weak passwords to sophisticated social engineering schemes like phishing. Password guessing. Cybercriminals often employ special software to automate the guessing process by targeting information such as usernames, passwords, and PINs.

Top Articles
¿Qué es el phishing? Protéjase en Internet contra los ataques
Whitehouse: Offshore Tax Evasion by Big Corporations, the Wealthy Cheats American People | U.S. Senate Committee On The Budget
Lakers Game Summary
The Largest Banks - ​​How to Transfer Money With Only Card Number and CVV (2024)
Splunk Stats Count By Hour
Federal Fusion 308 165 Grain Ballistics Chart
Craigslist Portales
Coffman Memorial Union | U of M Bookstores
Txtvrfy Sheridan Wy
The Potter Enterprise from Coudersport, Pennsylvania
Nyuonsite
Mivf Mdcalc
Craigslist Greenville Craigslist
Driving Directions To Atlanta
Teenleaks Discord
SXSW Film & TV Alumni Releases – July & August 2024
Sport-News heute – Schweiz & International | aktuell im Ticker
Stardew Expanded Wiki
Fort Mccoy Fire Map
Little Caesars 92Nd And Pecos
Wbiw Weather Watchers
About My Father Showtimes Near Copper Creek 9
SOGo Groupware - Rechenzentrum Universität Osnabrück
Gillette Craigslist
Visit the UK as a Standard Visitor
Tripcheck Oregon Map
Otis Offender Michigan
Graphic Look Inside Jeffrey Dresser
Plato's Closet Mansfield Ohio
2015 Chevrolet Silverado 1500 for sale - Houston, TX - craigslist
The Ride | Rotten Tomatoes
Truckers Report Forums
Helloid Worthington Login
Ljw Obits
Craigs List Stockton
Can You Buy Pedialyte On Food Stamps
20 Best Things to Do in Thousand Oaks, CA - Travel Lens
Game8 Silver Wolf
Pp503063
Myanswers Com Abc Resources
8 Ball Pool Unblocked Cool Math Games
2020 Can-Am DS 90 X Vs 2020 Honda TRX90X: By the Numbers
T&Cs | Hollywood Bowl
Alba Baptista Bikini, Ethnicity, Marriage, Wedding, Father, Shower, Nazi
Ts In Baton Rouge
Cvs Coit And Alpha
Jimmy John's Near Me Open
25 Hotels TRULY CLOSEST to Woollett Aquatics Center, Irvine, CA
Ajpw Sugar Glider Worth
Congressional hopeful Aisha Mills sees district as an economical model
Morgan State University Receives $20.9 Million NIH/NIMHD Grant to Expand Groundbreaking Research on Urban Health Disparities
Escape From Tarkov Supply Plans Therapist Quest Guide
Latest Posts
Article information

Author: Pres. Lawanda Wiegand

Last Updated:

Views: 5819

Rating: 4 / 5 (71 voted)

Reviews: 86% of readers found this page helpful

Author information

Name: Pres. Lawanda Wiegand

Birthday: 1993-01-10

Address: Suite 391 6963 Ullrich Shore, Bellefort, WI 01350-7893

Phone: +6806610432415

Job: Dynamic Manufacturing Assistant

Hobby: amateur radio, Taekwondo, Wood carving, Parkour, Skateboarding, Running, Rafting

Introduction: My name is Pres. Lawanda Wiegand, I am a inquisitive, helpful, glamorous, cheerful, open, clever, innocent person who loves writing and wants to share my knowledge and understanding with you.