| Naziv |
Timestamp Request |
|---|---|
| Sažetak | This pattern of attack leverages standard requests to learn the exact time associated with a target system. An adversary may be able to use the timestamp returned from the target to attack time-based security algorithms, such as random number generators, or time-based authentication mechanisms. |
| Preduvjeti | The ability to send a timestamp request to a remote target and receive a response. |
| Rješenja | no |

