wisemonkeys logo
FeedNotificationProfileManage Forms
FeedNotificationSearchSign in
wisemonkeys logo

Blogs

Broken Authentication Attacks

profile
18_prachi Kandalkar
Oct 20, 2021
0 Likes
0 Discussions
93 Reads


Broken Authentication is related to login page, to broke the authentication of the web application its a vulnerability in the login page broken authentication is divided into two parts:-
1)Credential Stuffing: As if any web application data gets leak so attackers use the username and 
password to login any more others account and try to get the confidential information. To avoid this 
attacks can use two factor authentication.
2)Default Password:- A default password is a device usual preconfigured password. Several devices run 
pre-configured with such passwords, if we didn't change then their is high security risk. Use strong
password so nobody could guess your password.

Session Management Attacks
The big issue of Session Management is session id is passed in URL only. Attackers can acquire passwords
or session IDs to access user accounts and mimic their IDs if session management is not properly 
secured and managed. Attackers can imitate other users on the network, system, or application if 
session IDs are hacked.  This type of Attack is known as session hijacking.


Comments ()


Sign in

Read Next

DEVELOPMENTS LEADING TO MODERN OPERATING SYSTEMS

Blog banner

Electronic Funds Transfer

Blog banner

Deadlock and Starvation

Blog banner

Cyber-crime Investigation and Future Directions

Blog banner

Does School Infrastructure Really Matter For Learning?

Blog banner

Components of GIS

Blog banner

ODOO

Blog banner

Instagram

Blog banner

What is Internet

Blog banner

MYNTRA

Blog banner

Game via listing method

Blog banner

Ubiquitous Computing

Blog banner

Travelling blog

Blog banner

THE INPACT OF SOCIAL MEDIA!

Blog banner

Information of meesho company

Blog banner

Women empowerment

Blog banner

A MODERN OPERATING SYSTEM

Blog banner

EVOLUTION OF THE MIRCOPROCESSOR

Blog banner

How to tie a Tie

Blog banner

How to Avoid being a Victim of Cybercrime

Blog banner

Practical Implementation of Client Server model using TCP/IP.

Blog banner

Points to consider if you're planning to visit Florida in 2026

Blog banner

Crypto tax evasion

Blog banner

Tracking Emails & Email Crimes

Blog banner

Instagram Features in 2023 That Will Leave You Stunned!

Blog banner

Deadlocks

Blog banner

Utilizing Data-Hiding and Retrieval Techniques in Cyber Forensics

Blog banner

The application udemy

Blog banner

SMARTSHEET

Blog banner

Top 5 Tech Innovations of 2018

Blog banner

NETSUITE

Blog banner

Interrupts in operating system.

Blog banner

How I use google in my daily life

Blog banner

Instagram

Blog banner

Apache Spark :- Powerful Data Processing Tool

Blog banner

Digital Footprints An Emerging Dimension of Digital Inequality

Blog banner

COMFORT IS ALL ABOUT FASHION

Blog banner

Multiprocessor and scheduling

Blog banner

Evolution of Operating system

Blog banner

Types of Threads

Blog banner

Process and Threading

Blog banner

What is OS and its overview

Blog banner