wisemonkeys logo
FeedNotificationProfileManage Forms
FeedNotificationSearchSign in
wisemonkeys logo

Blogs

Broken Authentication Attacks

profile
18_prachi Kandalkar
Oct 20, 2021
0 Likes
0 Discussions
93 Reads


Broken Authentication is related to login page, to broke the authentication of the web application its a vulnerability in the login page broken authentication is divided into two parts:-
1)Credential Stuffing: As if any web application data gets leak so attackers use the username and 
password to login any more others account and try to get the confidential information. To avoid this 
attacks can use two factor authentication.
2)Default Password:- A default password is a device usual preconfigured password. Several devices run 
pre-configured with such passwords, if we didn't change then their is high security risk. Use strong
password so nobody could guess your password.

Session Management Attacks
The big issue of Session Management is session id is passed in URL only. Attackers can acquire passwords
or session IDs to access user accounts and mimic their IDs if session management is not properly 
secured and managed. Attackers can imitate other users on the network, system, or application if 
session IDs are hacked.  This type of Attack is known as session hijacking.


Comments ()


Sign in

Read Next

Puri Jagannath temple

Blog banner

Service Catalogue Management

Blog banner

NETWORK SECURITY RISKS

Blog banner

Top 5 Post-Wedding Skin Care Tips

Blog banner

Understanding Endometriosis and Its Psychological Impact on Quality of Life

Blog banner

Developments in Modern Operating Systems

Blog banner

MODERN OPERATING SYSTEM

Blog banner

Modern OS

Blog banner

Deadlock in Operating System

Blog banner

Fitness regime by Deepesh

Blog banner

bulk email software

Blog banner

computer security

Blog banner

The functions of operating system

Blog banner

Data Lake

Blog banner

How to write a cover letter

Blog banner

Deadlock and Starvation

Blog banner

Threads

Blog banner

Rain

Blog banner

APACHE KAFKA

Blog banner

How to use GIT & GITHUB

Blog banner

?Why Does My Breath Still Smell After Brushing?

Blog banner

Kernel Modes: User Mode vs. Kernel Mode - 80

Blog banner

Gis in agriculture and farming

Blog banner

Data Exfiltration

Blog banner

RAID

Blog banner

Challenges of Digital forensics in cloud computing environment

Blog banner

Vulnerability Assessment (Vulnerability Analysis)

Blog banner

Synchronization

Blog banner

Linux -V Server Virtual Machine

Blog banner

Delhi city

Blog banner

Electronic Evidence in Cyber Forensics

Blog banner

Operating System Objectives and Functions

Blog banner

Threat management

Blog banner

Phishing

Blog banner

From Websites To Super Apps For Digital User Experience

Blog banner

INTERNET SECURITY

Blog banner

Child labour

Blog banner

"Mahakali cave"

Blog banner

Next time you click on "Remind me later", think twice!

Blog banner

Race condition

Blog banner

What is time ? The term which has astonished Scientists

Blog banner

Consumer to consumer business mode

Blog banner