wisemonkeys logo
FeedNotificationProfileManage Forms
FeedNotificationSearchSign in
wisemonkeys logo

Blogs

Broken Authentication Attacks

profile
18_prachi Kandalkar
Oct 20, 2021
0 Likes
0 Discussions
93 Reads


Broken Authentication is related to login page, to broke the authentication of the web application its a vulnerability in the login page broken authentication is divided into two parts:-
1)Credential Stuffing: As if any web application data gets leak so attackers use the username and 
password to login any more others account and try to get the confidential information. To avoid this 
attacks can use two factor authentication.
2)Default Password:- A default password is a device usual preconfigured password. Several devices run 
pre-configured with such passwords, if we didn't change then their is high security risk. Use strong
password so nobody could guess your password.

Session Management Attacks
The big issue of Session Management is session id is passed in URL only. Attackers can acquire passwords
or session IDs to access user accounts and mimic their IDs if session management is not properly 
secured and managed. Attackers can imitate other users on the network, system, or application if 
session IDs are hacked.  This type of Attack is known as session hijacking.


Comments ()


Sign in

Read Next

Software

Blog banner

Unlocking the Secrets: Basic Operations of Computer Forensic Laboratories

Blog banner

Operating system

Blog banner

Analysis of Digital Evidence In Identity Theft Investigations

Blog banner

The Rich Heritage Of Patola Sarees: Gujarat’s Timeless Weaving Art

Blog banner

Assignment-3

Blog banner

Virtual memory in Operating System

Blog banner

Embaded operating system

Blog banner

Memory management

Blog banner

MEMORY MANAGEMENT

Blog banner

USES OF WHATSAPP

Blog banner

KEAP MANAGEMENT SYSTEM

Blog banner

Introduction to Solidity Programming for Blockchain Development

Blog banner

The New Classic: Indo Western Patola Outfits for Today’s Woman

Blog banner

Wiretapping

Blog banner

The Real Reason Patola Outfits Come at a Premium Cost

Blog banner

Hacking Mobile Platforms

Blog banner

Hello World

Blog banner

Craziness of dream 11 and how it impacts on our life

Blog banner

Information of meesho company

Blog banner

Virtual Memory

Blog banner

Puri Jagannath temple

Blog banner

How To Invest In Indian Stock Market @ BSE & NSE ~ Tutorial 3

Blog banner

The Art of Slow Fashion: Why Patola Defines Sustainable Luxury

Blog banner

Virtual Machine

Blog banner

Proof-of-Stake (PoS)

Blog banner

K-means use cases

Blog banner

What is Email? Uses of Emails

Blog banner

WHAT IS TWITTER AND HOW DOES IT WORK

Blog banner

Phishing

Blog banner

Why Time Management Is the Secret to College Success (and How to Master It)

Blog banner

internet email and it's applications

Blog banner

Jira service Management

Blog banner

Modern operating system

Blog banner

OPERATING SYSTEM OBJECTIVES AND FUNCTIONS

Blog banner

MACHINE LEARNING

Blog banner

Krishna Rao SAP ID--53003230076

Blog banner

UniProcessor Scheduling

Blog banner

10 Types of Friends in every friend group

Blog banner

What Makes Patola the Queen of Silk?

Blog banner

Memory Management

Blog banner

Blockchain technology: security risk and prevention

Blog banner