The attacker subverts a communications protocol to perform an attack. These attacks can allow the attacker to impersonate others, discover sensitive information, control the outcome of a session, or perform other attacks. These attacks target invalid assumptions that may be inherent in implementers of the protocol, incorrect implementations of the protocol, or vulnerabilities in the protocol itself.