| Nature | Type | ID | Name |
|---|---|---|---|
| ChildOf | S | 230 | Serialized Data with Nested Payloads |
| CanFollow | D | 228 | DTD Injection |
Survey the target
An adversary determines the input data stream that is being processed by a data parser that supports using substituion on the victim's side.
| Technique |
|---|
| Use an automated tool to record all instances of URLs to process requests. |
| Use a browser to manually explore the website and analyze how the application processes requests. |
Craft malicious payload
The adversary crafts malicious message containing nested quadratic expansion that completely uses up available server resource.
| Technique |
|---|
Send the message
Send the malicious crafted message to the target URL.
| Technique |
|---|
| Scope | Likelihood | Impact | Note |
|---|---|---|---|
| Availability | N/A | Unreliable ExecutionResource Consumption | Denial of Service |
| Taxonomy Name | Entry ID | Entry Name |
|---|