| CAPEC Details | |||||
|---|---|---|---|---|---|
| Name | Protocol Manipulation | ||||
      
  | |||||
| Summary | An adversary subverts a communications protocol to perform an attack. This type of attack can allow an adversary to impersonate others, discover sensitive information, control the outcome of a session, or perform other attacks. This type of attack targets invalid assumptions that may be inherent in implementers of the protocol, incorrect implementations of the protocol, or vulnerabilities in the protocol itself. | ||||
| Prerequisites | The protocol or implementations thereof must contain bugs that an adversary can exploit. | ||||
| Solutions |