User contributions for Anna
Jump to navigation
Jump to search
25 January 2016
- 18:2518:25, 25 January 2016 diff hist +124 Replay Attack →Target
- 18:2518:25, 25 January 2016 diff hist +123 Certificate Faking →Target
- 18:2418:24, 25 January 2016 diff hist +74 Signature Exclusion Attack No edit summary
- 18:0918:09, 25 January 2016 diff hist +50 Signature Exclusion Attack →Target
- 17:0917:09, 25 January 2016 diff hist −3 Signature Exclusion Attack No edit summary
- 17:0717:07, 25 January 2016 diff hist −59 XSLT Attack No edit summary
- 17:0317:03, 25 January 2016 diff hist −60 XML External Entity Attack No edit summary
- 17:0017:00, 25 January 2016 diff hist −54 Token Recipient Confusion No edit summary
- 16:5416:54, 25 January 2016 diff hist −11 XML Signature Wrapping No edit summary
- 16:4816:48, 25 January 2016 diff hist −56 Replay Attack No edit summary
- 16:4416:44, 25 January 2016 diff hist −61 Certificate Faking No edit summary
- 16:3616:36, 25 January 2016 diff hist −63 Signature Exclusion Attack No edit summary
- 16:1916:19, 25 January 2016 diff hist +4 Token Recipient Confusion →Attack example
- 16:1916:19, 25 January 2016 diff hist +4 Token Recipient Confusion →Attack example
- 16:1816:18, 25 January 2016 diff hist +99 Token Recipient Confusion No edit summary
14 January 2016
- 20:2220:22, 14 January 2016 diff hist +168 Token Recipient Confusion →References
- 20:1720:17, 14 January 2016 diff hist +72 Token Recipient Confusion →Practical Attack Examples
- 20:1620:16, 14 January 2016 diff hist −64 Token Recipient Confusion →Practical Attack Examples
- 20:1620:16, 14 January 2016 diff hist +6 Token Recipient Confusion →Attack mitigation / countermeasures
- 20:1420:14, 14 January 2016 diff hist 0 N File:Token Recipient Confusion.jpg No edit summary current
- 20:1320:13, 14 January 2016 diff hist +120 Token Recipient Confusion →Graphical representation of attack
- 18:5618:56, 14 January 2016 diff hist +1 Token Recipient Confusion →Attack example
- 18:5318:53, 14 January 2016 diff hist −5 Token Recipient Confusion →Practical Attack Examples
- 18:5118:51, 14 January 2016 diff hist +432 Token Recipient Confusion →Attack description
- 18:4818:48, 14 January 2016 diff hist +157 Token Recipient Confusion →Attack mitigation / countermeasures
- 18:4418:44, 14 January 2016 diff hist +2 Token Recipient Confusion →Attack mitigation / countermeasures
- 18:3718:37, 14 January 2016 diff hist +45 Token Recipient Confusion →Attack subtypes
- 18:2418:24, 14 January 2016 diff hist −46 XML Signature Wrapping →Attack subtypes
- 18:2018:20, 14 January 2016 diff hist −2 Main Page No edit summary
- 18:1918:19, 14 January 2016 diff hist +6 Main Page No edit summary
- 18:1818:18, 14 January 2016 diff hist −2 Main Page No edit summary
- 17:3617:36, 14 January 2016 diff hist +2 Main Page No edit summary
- 17:3517:35, 14 January 2016 diff hist +237 Main Page No edit summary
- 17:3217:32, 14 January 2016 diff hist +165 N Category:Attack Categorisation By Violated Security Objective Integrity Created page with "==Part of main category:== *Category:Attack_Categorisation_By_Violated_Security_Objective Category:Attack_Categorisation_By_Violated_Security_Objective <br>" current
- 17:3217:32, 14 January 2016 diff hist +165 N Category:Attack Categorisation By Violated Security Objective Availability Created page with "==Part of main category:== *Category:Attack_Categorisation_By_Violated_Security_Objective Category:Attack_Categorisation_By_Violated_Security_Objective <br>" current
- 17:3117:31, 14 January 2016 diff hist +1,433 Token Recipient Confusion No edit summary
- 16:5716:57, 14 January 2016 diff hist +10 Token Recipient Confusion No edit summary
- 16:5716:57, 14 January 2016 diff hist +2,338 Token Recipient Confusion No edit summary
- 16:3716:37, 14 January 2016 diff hist +429 N Token Recipient Confusion Created page with "=Attack description= =Attack subtypes= =Prerequisites for attack= =Graphical representation of attack= =Attack example= =Attack mitigation / countermeasures= =Prac..."
- 16:3416:34, 14 January 2016 diff hist 0 XML Signature Wrapping →Attack example
- 16:3316:33, 14 January 2016 diff hist +2 XML Signature Wrapping →Attack example
- 16:3316:33, 14 January 2016 diff hist +45 XML Signature Wrapping →Attack subtypes
- 16:2116:21, 14 January 2016 diff hist −7 Main Page No edit summary
- 16:2116:21, 14 January 2016 diff hist −2 Main Page No edit summary
- 16:2016:20, 14 January 2016 diff hist −2 Main Page No edit summary
- 16:1816:18, 14 January 2016 diff hist 0 Main Page No edit summary
- 16:1516:15, 14 January 2016 diff hist +7 Main Page No edit summary
- 16:1416:14, 14 January 2016 diff hist −2 Main Page No edit summary
- 16:1316:13, 14 January 2016 diff hist +336 Main Page →Welcome to SSO-Attacks!
- 16:0116:01, 14 January 2016 diff hist +39 Main Page →Welcome to SSO-Attacks!
- 16:0016:00, 14 January 2016 diff hist +6 Main Page No edit summary
- 15:5515:55, 14 January 2016 diff hist +1,012 Main Page No edit summary
7 January 2016
- 22:3622:36, 7 January 2016 diff hist +13 XML Signature Wrapping →Graphical representation of attack
- 22:3322:33, 7 January 2016 diff hist +3,327 XML Signature Wrapping No edit summary
- 22:2222:22, 7 January 2016 diff hist 0 N File:XML Signature Wrapping.jpg No edit summary current
- 20:1520:15, 7 January 2016 diff hist +429 N XML Signature Wrapping Created page with "=Attack description= =Attack subtypes= =Prerequisites for attack= =Graphical representation of attack= =Attack example= =Attack mitigation / countermeasures= =Prac..."
- 19:4719:47, 7 January 2016 diff hist +234 Certificate Faking →Practical Attack Examples
- 19:4619:46, 7 January 2016 diff hist −234 XML External Entity Attack →Practical Attack Examples
- 19:2319:23, 7 January 2016 diff hist −54 Certificate Faking →Practical Attack Examples
20 December 2015
- 17:1317:13, 20 December 2015 diff hist +5 XML External Entity Attack →References
- 17:1117:11, 20 December 2015 diff hist +123 XML External Entity Attack →References
- 17:1017:10, 20 December 2015 diff hist +235 XML External Entity Attack →Practical Attack Examples
- 17:0617:06, 20 December 2015 diff hist +175 XML External Entity Attack →References
- 17:0217:02, 20 December 2015 diff hist +789 SAML →Login with SAML current
- 16:3916:39, 20 December 2015 diff hist +1,333 SAML →Login with SAML
- 16:3716:37, 20 December 2015 diff hist 0 N File:Response Schema.jpg No edit summary
- 14:3714:37, 20 December 2015 diff hist −168 SAML →Login with SAML
- 14:3414:34, 20 December 2015 diff hist +163 SAML →Login with SAML
- 14:3314:33, 20 December 2015 diff hist 0 N File:SAML Response.jpg No edit summary current
- 14:1714:17, 20 December 2015 diff hist 0 N File:AuthnRequest1.jpg No edit summary current
9 December 2015
- 20:2720:27, 9 December 2015 diff hist +4 Replay Attack →Practical Attack Examples
- 20:2420:24, 9 December 2015 diff hist +451 Replay Attack →Attack mitigation / countermeasures
- 20:2420:24, 9 December 2015 diff hist −452 Replay Attack →Attack description
- 20:1120:11, 9 December 2015 diff hist +12 XSLT Attack →Practical Attack Examples
- 20:0720:07, 9 December 2015 diff hist +5 XSLT Attack →Prerequisites for attack
- 20:0520:05, 9 December 2015 diff hist +37 XSLT Attack →Attack description
8 December 2015
- 22:2222:22, 8 December 2015 diff hist +4 Replay Attack →Prerequisites for attack
- 22:2222:22, 8 December 2015 diff hist +3 Replay Attack →Prerequisites for attack
- 22:1422:14, 8 December 2015 diff hist +171 N Category:Attack Categorisation By Attacked Web Service Component: Web Service Client Created page with "==Part of main category:== *Category:Attack_Categorisation_By_Attacked_Web_Service_Component Category:Attack_Categorisation_By_Attacked_Web_Service_Component <br>" current
- 22:1422:14, 8 December 2015 diff hist +322 Replay Attack →Practical Attack Examples
- 22:0922:09, 8 December 2015 diff hist +1 Replay Attack →Graphical representation of attack
- 22:0922:09, 8 December 2015 diff hist −1 Replay Attack →Graphical representation of attack
- 22:0822:08, 8 December 2015 diff hist +7 Category:Attack Categorisation By Attacker Model: Access to Valid Token No edit summary
- 22:0822:08, 8 December 2015 diff hist +154 Category:Attack Categorisation By Attacker Model: Access to Valid Token No edit summary
- 22:0422:04, 8 December 2015 diff hist +301 N Category:Attack Categorisation By Attacker Model: Access to Valid Token Created page with "The attacker knows the component for identification and authentication of the user. The goal in this class of attacks is to expand the rights provided by the given token. Usin..."
- 22:0122:01, 8 December 2015 diff hist +1 Replay Attack →Practical Attack Examples
- 22:0022:00, 8 December 2015 diff hist −1 Replay Attack No edit summary
- 22:0022:00, 8 December 2015 diff hist +1 Replay Attack →Attack example
- 21:5921:59, 8 December 2015 diff hist −7 Replay Attack →Graphical representation of attack
- 21:5821:58, 8 December 2015 diff hist −1 Replay Attack No edit summary
- 21:5721:57, 8 December 2015 diff hist +228 Replay Attack No edit summary
- 21:4721:47, 8 December 2015 diff hist 0 N File:Replay Attack.jpg No edit summary current
- 20:3520:35, 8 December 2015 diff hist +2,828 N Replay Attack Created page with "=Attack description= Every [https://en.wikipedia.org/wiki/Single_sign-on SSO] protocol provides freshness parameters ''N'' to limit the reuse and lifetime of the authenticatio..."
- 20:0320:03, 8 December 2015 diff hist −1 XSLT Attack No edit summary
- 20:0220:02, 8 December 2015 diff hist +1 XSLT Attack →Practical Attack Examples
- 20:0020:00, 8 December 2015 diff hist −110 XSLT Attack →Attack example
- 20:0020:00, 8 December 2015 diff hist +6 XSLT Attack →Attack example
- 19:5919:59, 8 December 2015 diff hist +1 XSLT Attack →Attack example
- 19:5819:58, 8 December 2015 diff hist −1 XSLT Attack →Prerequisites for attack
- 19:5819:58, 8 December 2015 diff hist −1 XSLT Attack →Attack description