CAPEC-295: Timestamp Request
This pattern of attack leverages standard requests to learn the exact time associated with a target system. An adversary may be able to use the timestamp returned from the target to attack time-based security algorithms, such as random number generators, or time-based authentication mechanisms.
Severity
Low
14
/ 100
low-risk
Active Threat
12/50 · Low
Exploit Availability
2/50 · Minimal