Vulnerability Intelligence and Management by Cybersecurity Help s.r.o.



Reflection Attack in an Authentication Protocol

Simple authentication protocols are subject to reflection attacks if a malicious user can use the target machine to impersonate a trusted user.