CAPEC-295: Timestamp Request

This pattern of attack leverages standard requests to learn the exact time associated with a target system. An adversary may be able to use the timestamp returned from the target to attack time-based security algorithms, such as random number generators, or time-based authentication mechanisms.

Severity
Low
14
/ 100
low-risk
Active Threat 12/50 · Low
Exploit Availability 2/50 · Minimal