August 2018
Intermediate to advanced
254 pages
6h 20m
English
The user interaction metric indicates the actions that the target user needs to perform (apart from the attacker's action) to successfully exploit the vulnerability. Some vulnerabilities could be exploited solely by the attacker while the others might need additional user interaction/participation:
|
Parameter |
Description |
Example |
|
None |
The attacker can exploit the vulnerable system/component without requiring any interaction from the victim/user. |
Denial of service caused by sending specially crafted TCP packet |
|
Required |
Attacker would require the victim (user) to perform some kind of action in order to exploit the vulnerability. |
Drive-by-wire attacks, clickjacking |
Read now
Unlock full access