wisemonkeys logo
FeedNotificationProfileManage Forms
FeedNotificationSearchSign in
wisemonkeys logo

Blogs

Broken Authentication Attacks

profile
18_prachi Kandalkar
Oct 20, 2021
0 Likes
0 Discussions
93 Reads


Broken Authentication is related to login page, to broke the authentication of the web application its a vulnerability in the login page broken authentication is divided into two parts:-
1)Credential Stuffing: As if any web application data gets leak so attackers use the username and 
password to login any more others account and try to get the confidential information. To avoid this 
attacks can use two factor authentication.
2)Default Password:- A default password is a device usual preconfigured password. Several devices run 
pre-configured with such passwords, if we didn't change then their is high security risk. Use strong
password so nobody could guess your password.

Session Management Attacks
The big issue of Session Management is session id is passed in URL only. Attackers can acquire passwords
or session IDs to access user accounts and mimic their IDs if session management is not properly 
secured and managed. Attackers can imitate other users on the network, system, or application if 
session IDs are hacked.  This type of Attack is known as session hijacking.


Comments ()


Sign in

Read Next

LIMITED EDITION

Blog banner

Developments in Modern Operating Systems

Blog banner

Self-love: Being the reason of your own smile

Blog banner

Microsoft Windows Overview

Blog banner

From Websites To Super Apps For Digital User Experience

Blog banner

Uniprocessor scheduling

Blog banner

Bharat Maps

Blog banner

IOT Hacking Techniques

Blog banner

The Power of Forensic Watermarking in the Fight Against Content Piracy

Blog banner

Synchronization

Blog banner

Software Piracy & Online Data Protection in Digital World

Blog banner

MEMORY MANAGEMENT FILE

Blog banner

File sharing

Blog banner

Crypto tax evasion

Blog banner

memory managment

Blog banner

How Sleep Impacts Learning and Behaviour for Toddlers?

Blog banner

Save Environment

Blog banner

Multicore and multithreading 171

Blog banner

Office Lunch Problems in Mumbai and How Tiffin Services Solve Them

Blog banner

WHAT IS TWITTER AND HOW DOES IT WORK

Blog banner

What is Virtual Memory

Blog banner

Building a Better You: Fitness Tips and Inspiration.

Blog banner

Worms, viruses and Bots

Blog banner

How User Data Shapes Personalised Campaigns

Blog banner

MAHAKAL LOK UJJAIN

Blog banner

MODERN OPERATING SYSTEM

Blog banner

What is Network Security?

Blog banner

Virtualisation

Blog banner

EVOLUTION OF MICROPROCESSOR

Blog banner

Blog on health and fitness

Blog banner

EdTech (Education Technology)

Blog banner

MY MOST THRILLED TREK ..... BHAIRAVGAD

Blog banner

Interrupts

Blog banner

Are Social Media Paid Campaigns Worth It?

Blog banner

10 Interesting Facts about Death Note

Blog banner

Raid

Blog banner

Install Ubuntu Easily

Blog banner

38_Exploring The Honeynet Project

Blog banner

MEMORY MANAGEMENT

Blog banner

Incident management in ITSM

Blog banner

DATA SCIENCE IN BUSINESS AND MARKETING

Blog banner

Time Series Analysis

Blog banner