When attempting to write Data from an Application where the attacker has gained low-level privileges, specificAccess, we check to see if they have attained the required permissions. This should also be the case for a respond connect attack as it is the attacker manipulating the received Data to induce the creation of responses that give it control. This pull request introduces the authorizedApplicationRespondConnectThroughData attack step to implement that.
When attempting to write
Data
from anApplication
where the attacker has gained low-level privileges,specificAccess
, we check to see if they have attained the required permissions. This should also be the case for a respond connect attack as it is the attacker manipulating the receivedData
to induce the creation of responses that give it control. This pull request introduces theauthorizedApplicationRespondConnectThroughData
attack step to implement that.