CAPEC CAPEC-115: Authentication Bypass (Version 3.9) (2024)

CAPEC-115: Authentication Bypass

Attack Pattern ID: 115

Abstraction: Meta

View customized information:

Description

An attacker gains access to application, service, or device with the privileges of an authorized or privileged user by evading or circumventing an authentication mechanism. The attacker is therefore able to access protected data without authentication ever having taken place.

Extended Description

This refers to an attacker gaining access equivalent to an authenticated user without ever going through an authentication procedure. This is usually the result of the attacker using an unexpected access procedure that does not go through the proper checkpoints where authentication should occur. For example, a web site might assume that all users will click through a given link in order to get to secure material and simply authenticate everyone that clicks the link. However, an attacker might be able to reach secured web content by explicitly entering the path to the content rather than clicking through the authentication link, thereby avoiding the check entirely. This attack pattern differs from other authentication attacks in that attacks of this pattern avoid authentication entirely, rather than faking authentication by exploiting flaws or by stealing credentials from legitimate users.

Relationships

CAPEC CAPEC-115: Authentication Bypass (Version 3.9) (1)This table shows the other attack patterns and high level categories that are related to this attack pattern. These relationships are defined as ChildOf and ParentOf, and give insight to similar items that may exist at higher and lower levels of abstraction. In addition, relationships such as CanFollow, PeerOf, and CanAlsoBe are defined to show similar attack patterns that the user may want to explore.

NatureTypeIDName
ParentOfCAPEC CAPEC-115: Authentication Bypass (Version 3.9) (2)Standard Attack Pattern - A standard level attack pattern in CAPEC is focused on a specific methodology or technique used in an attack. It is often seen as a singular piece of a fully executed attack. A standard attack pattern is meant to provide sufficient details to understand the specific technique and how it attempts to accomplish a desired goal. A standard level attack pattern is a specific type of a more abstract meta level attack pattern.87Forceful Browsing
ParentOfCAPEC CAPEC-115: Authentication Bypass (Version 3.9) (3)Standard Attack Pattern - A standard level attack pattern in CAPEC is focused on a specific methodology or technique used in an attack. It is often seen as a singular piece of a fully executed attack. A standard attack pattern is meant to provide sufficient details to understand the specific technique and how it attempts to accomplish a desired goal. A standard level attack pattern is a specific type of a more abstract meta level attack pattern.461Web Services API Signature Forgery Leveraging Hash Function Extension Weakness
ParentOfCAPEC CAPEC-115: Authentication Bypass (Version 3.9) (4)Standard Attack Pattern - A standard level attack pattern in CAPEC is focused on a specific methodology or technique used in an attack. It is often seen as a singular piece of a fully executed attack. A standard attack pattern is meant to provide sufficient details to understand the specific technique and how it attempts to accomplish a desired goal. A standard level attack pattern is a specific type of a more abstract meta level attack pattern.480Escaping Virtualization
ParentOfCAPEC CAPEC-115: Authentication Bypass (Version 3.9) (5)Standard Attack Pattern - A standard level attack pattern in CAPEC is focused on a specific methodology or technique used in an attack. It is often seen as a singular piece of a fully executed attack. A standard attack pattern is meant to provide sufficient details to understand the specific technique and how it attempts to accomplish a desired goal. A standard level attack pattern is a specific type of a more abstract meta level attack pattern.664Server Side Request Forgery
ParentOfCAPEC CAPEC-115: Authentication Bypass (Version 3.9) (6)Standard Attack Pattern - A standard level attack pattern in CAPEC is focused on a specific methodology or technique used in an attack. It is often seen as a singular piece of a fully executed attack. A standard attack pattern is meant to provide sufficient details to understand the specific technique and how it attempts to accomplish a desired goal. A standard level attack pattern is a specific type of a more abstract meta level attack pattern.668Key Negotiation of Bluetooth Attack (KNOB)
CanFollowCAPEC CAPEC-115: Authentication Bypass (Version 3.9) (7)Detailed Attack Pattern - A detailed level attack pattern in CAPEC provides a low level of detail, typically leveraging a specific technique and targeting a specific technology, and expresses a complete execution flow. Detailed attack patterns are more specific than meta attack patterns and standard attack patterns and often require a specific protection mechanism to mitigate actual attacks. A detailed level attack pattern often will leverage a number of different standard level attack patterns chained together to accomplish a goal.33HTTP Request Smuggling
CanFollowCAPEC CAPEC-115: Authentication Bypass (Version 3.9) (8)Detailed Attack Pattern - A detailed level attack pattern in CAPEC provides a low level of detail, typically leveraging a specific technique and targeting a specific technology, and expresses a complete execution flow. Detailed attack patterns are more specific than meta attack patterns and standard attack patterns and often require a specific protection mechanism to mitigate actual attacks. A detailed level attack pattern often will leverage a number of different standard level attack patterns chained together to accomplish a goal.34HTTP Response Splitting
CanFollowCAPEC CAPEC-115: Authentication Bypass (Version 3.9) (9)Detailed Attack Pattern - A detailed level attack pattern in CAPEC provides a low level of detail, typically leveraging a specific technique and targeting a specific technology, and expresses a complete execution flow. Detailed attack patterns are more specific than meta attack patterns and standard attack patterns and often require a specific protection mechanism to mitigate actual attacks. A detailed level attack pattern often will leverage a number of different standard level attack patterns chained together to accomplish a goal.105HTTP Request Splitting
CanFollowCAPEC CAPEC-115: Authentication Bypass (Version 3.9) (10)Detailed Attack Pattern - A detailed level attack pattern in CAPEC provides a low level of detail, typically leveraging a specific technique and targeting a specific technology, and expresses a complete execution flow. Detailed attack patterns are more specific than meta attack patterns and standard attack patterns and often require a specific protection mechanism to mitigate actual attacks. A detailed level attack pattern often will leverage a number of different standard level attack patterns chained together to accomplish a goal.273HTTP Response Smuggling

CAPEC CAPEC-115: Authentication Bypass (Version 3.9) (11)This table shows the views that this attack pattern belongs to and top level categories within that view.

View NameTop Level Categories
Domains of AttackSoftware
Mechanisms of AttackSubvert Access Control

Prerequisites

An authentication mechanism or subsystem implementing some form of authentication such as passwords, digest authentication, security certificates, etc.

Resources Required

A client application, such as a web browser, or a scripting language capable of interacting with the target.

Related Weaknesses

CAPEC CAPEC-115: Authentication Bypass (Version 3.9) (12)A Related Weakness relationship associates a weakness with this attack pattern. Each association implies a weakness that must exist for a given attack to be successful. If multiple weaknesses are associated with the attack pattern, then any of the weaknesses (but not necessarily all) may be present for the attack to be successful. Each related weakness is identified by a CWE identifier.

CWE-IDWeakness Name
287Improper Authentication

Taxonomy Mappings

CAPEC CAPEC-115: Authentication Bypass (Version 3.9) (13)CAPEC mappings to ATT&CK techniques leverage an inheritance model to streamline and minimize direct CAPEC/ATT&CK mappings. Inheritance of a mapping is indicated by text stating that the parent CAPEC has relevant ATT&CK mappings. Note that the ATT&CK Enterprise Framework does not use an inheritance model as part of the mapping to CAPEC.

Relevant to the ATT&CK taxonomy mapping

Entry IDEntry Name
1548Abuse Elevation Control Mechanism

References

[REF-598] "OWASP Web Security Testing Guide". Testing for Bypassing Authentication Schema. The Open Web Application Security Project (OWASP). <https://owasp.org/www-project-web-security-testing-guide/latest/4-Web_Application_Security_Testing/04-Authentication_Testing/04-Testing_for_Bypassing_Authentication_Schema.html>.

Content History

Submissions
Submission DateSubmitterOrganization
2014-06-23

(Version 2.6)

CAPEC Content TeamThe MITRE Corporation
Modifications
Modification DateModifierOrganization
2015-11-09

(Version 2.7)

CAPEC Content TeamThe MITRE Corporation
Updated Related_Attack_Patterns
2017-08-04

(Version 2.11)

CAPEC Content TeamThe MITRE Corporation
Updated Related_Weaknesses
2020-12-17

(Version 3.4)

CAPEC Content TeamThe MITRE Corporation
Updated References
2021-06-24

(Version 3.5)

CAPEC Content TeamThe MITRE Corporation
Updated Taxonomy_Mappings
2022-02-22

(Version 3.7)

CAPEC Content TeamThe MITRE Corporation
Updated Description, Extended_Description

More information is available — Please select a different filter.

CAPEC 

                CAPEC-115: Authentication Bypass                (Version 3.9) (2024)

FAQs

How authentication is bypassed by attackers? ›

Common methods include: Circumventing the login page by instead calling an internal page directly (forced browsing). Tampering with requests so that the application assumes the attacker has been authenticated. Attackers may do this by modifying an URL's parameter or manipulating a form, for example.

What is authentication bypass? ›

This refers to an attacker gaining access equivalent to an authenticated user without ever going through an authentication procedure. This is usually the result of the attacker using an unexpected access procedure that does not go through the proper checkpoints where authentication should occur.

Which of the following results in authentication bypass? ›

Answer & Explanation. The correct choice that leads to bypassing verification processes is the one related to weak security codes.

What is capec in cyber security? ›

Common Attack Pattern Enumeration and Classification.

Can hackers bypass the authenticator app? ›

Use authenticator apps

Most 2FA methods involve sending temporary codes via SMS or emails, but these can be easily intercepted by hackers through account takeover, SIM swapping, and/or MitM attacks.

What type of malware allows an attacker to bypass authentication? ›

The type of malware that allows an attacker to bypass authentication and gain access to a system is often referred to as a rootkit.

How do I authenticate a user without a password? ›

What are the Types of Passwordless Authentication?
  1. Biometrics: Physical traits, like fingerprint or retina scans, and behavioral traits, like typing and touch screen dynamics, are used to uniquely identify a person. ...
  2. Possession factors: Authentication via something that a user owns or carries with them.

What is an activation lock bypass code? ›

An MDM Activation Lock bypass code is a cryptographic key code generated during the deployment of managed Apple devices through an MDM. This bypass code can clear the device's activation lock without the Apple ID and password.

What bypasses normal authentication? ›

A backdoor is a typically covert method of bypassing normal authentication or encryption in a computer, product, embedded device (e.g. a home router), or its embodiment (e.g. part of a cryptosystem, algorithm, chipset, or even a "homunculus computer"—a tiny computer-within-a-computer such as that found in Intel's AMT ...

What is the correct method to pass authentication? ›

The list below reviews some common authentication methods used to secure modern systems.
  1. Password-based authentication. Passwords are the most common methods of authentication. ...
  2. Multi-factor authentication. ...
  3. Certificate-based authentication. ...
  4. Biometric authentication. ...
  5. Token-based authentication.

What is the difference between authentication and authorization bypass? ›

What is the difference between authentication and authorization? Authentication is the process of verifying that a user is who they claim to be. Authorization involves verifying whether a user is allowed to do something.

What is broken access control? ›

Broken access control vulnerability is a security flaw that allows unauthorized users to access, modify, or delete data they shouldn't have access to.

What would you use CAPEC for? ›

Penetration Testing Management Platform for security teams

CAPEC helps engineers and business understand the real context of vulnerabilities and attack patterns. By utilizing CAPEC, AttackForge pen testers are reducing time required to register a vulnerability and reporting, whilst increasing the quality of the output.

What does a CAPEC entry contain? ›

CAPEC entries are related to Common Weakness Enumeration (CWE™) and Common Vulnerabilities and Exposures (CVE®). The differences between Adversarial Tactics, Techniques & Common Knowledge (ATT&CK™), another related corpus, and CAPEC are discussed here.

What is blackholing in cyber security? ›

Blackholing involves redirecting traffic to a “black hole” or null route, which drops all traffic to the targeted IP address or range. This technique is used to prevent malicious traffic from reaching the targeted network or system during a DDoS attack.

How is broken authentication exploited? ›

Attackers exploit weak or reused passwords through various methods like phishing attacks, credential stuffing, or brute force attacks. Phishing attacks trick users into revealing their passwords, while credential stuffing uses previously leaked credentials to gain unauthorized access.

What is the method that bypasses the normal authentication process for a given system? ›

Backdoors provide us with a method of bypassing the normal authentication process for a given system.

How can attackers access a user account protected by two-factor authentication? ›

  • The man in the middle: 2FA theft through phishing. ...
  • Man in the browser: Malware as a man in the middle. ...
  • Personal contact: You are being tricked out of your code. ...
  • SIM swapping: Attackers steal your SIM card. ...
  • Malware steals authentication cookies. ...
  • Insecure factors as an alternative when logging in. ...
  • One-time passwords.
Sep 11, 2024

How do attackers gain unauthorized access? ›

There are several common scenarios of gaining unauthorized access, from hacking weak passwords to sophisticated social engineering schemes like phishing. Password guessing. Cybercriminals often employ special software to automate the guessing process by targeting information such as usernames, passwords, and PINs.

Top Articles
The Philippines opens its doors: new foreign investment opportunities | Withersworldwide
How to Start a Business with $0 Investment - Miranda Nahmias & Co.
Navicent Human Resources Phone Number
No Hard Feelings Showtimes Near Metropolitan Fiesta 5 Theatre
Uihc Family Medicine
COLA Takes Effect With Sept. 30 Benefit Payment
Nwi Police Blotter
Mlifeinsider Okta
Southland Goldendoodles
Vardis Olive Garden (Georgioupolis, Kreta) ✈️ inkl. Flug buchen
Jcpenney At Home Associate Kiosk
Best Restaurants Ventnor
123Moviescloud
Top tips for getting around Buenos Aires
Blackwolf Run Pro Shop
All Obituaries | Buie's Funeral Home | Raeford NC funeral home and cremation
Cocaine Bear Showtimes Near Regal Opry Mills
The Pretty Kitty Tanglewood
Long Island Jobs Craigslist
Catherine Christiane Cruz
Babbychula
Betaalbaar naar The Big Apple: 9 x tips voor New York City
Knock At The Cabin Showtimes Near Alamo Drafthouse Raleigh
Drift Hunters - Play Unblocked Game Online
3569 Vineyard Ave NE, Grand Rapids, MI 49525 - MLS 24048144 - Coldwell Banker
Soul Eater Resonance Wavelength Tier List
New Stores Coming To Canton Ohio 2022
Riverstock Apartments Photos
Log in to your MyChart account
Salemhex ticket show3
How often should you visit your Barber?
R/Orangetheory
Devotion Showtimes Near The Grand 16 - Pier Park
140000 Kilometers To Miles
Newsday Brains Only
Green Bay Crime Reports Police Fire And Rescue
Craigslist Neworleans
No Hard Feelings Showtimes Near Tilton Square Theatre
Rocketpult Infinite Fuel
A Man Called Otto Showtimes Near Amc Muncie 12
Qlima© Petroleumofen Elektronischer Laserofen SRE 9046 TC mit 4,7 KW CO2 Wächter • EUR 425,95
Low Tide In Twilight Manga Chapter 53
Kenner And Stevens Funeral Home
Exam With A Social Studies Section Crossword
Levi Ackerman Tattoo Ideas
Craigslist Woodward
St Anthony Hospital Crown Point Visiting Hours
Bank Of America Appointments Near Me
Call2Recycle Sites At The Home Depot
211475039
Latest Posts
Article information

Author: Pres. Lawanda Wiegand

Last Updated:

Views: 5819

Rating: 4 / 5 (71 voted)

Reviews: 86% of readers found this page helpful

Author information

Name: Pres. Lawanda Wiegand

Birthday: 1993-01-10

Address: Suite 391 6963 Ullrich Shore, Bellefort, WI 01350-7893

Phone: +6806610432415

Job: Dynamic Manufacturing Assistant

Hobby: amateur radio, Taekwondo, Wood carving, Parkour, Skateboarding, Running, Rafting

Introduction: My name is Pres. Lawanda Wiegand, I am a inquisitive, helpful, glamorous, cheerful, open, clever, innocent person who loves writing and wants to share my knowledge and understanding with you.