wisemonkeys logo
FeedNotificationProfileManage Forms
FeedNotificationSearchSign in
wisemonkeys logo

Blogs

Broken Authentication Attacks

profile
18_prachi Kandalkar
Oct 20, 2021
0 Likes
0 Discussions
93 Reads


Broken Authentication is related to login page, to broke the authentication of the web application its a vulnerability in the login page broken authentication is divided into two parts:-
1)Credential Stuffing: As if any web application data gets leak so attackers use the username and 
password to login any more others account and try to get the confidential information. To avoid this 
attacks can use two factor authentication.
2)Default Password:- A default password is a device usual preconfigured password. Several devices run 
pre-configured with such passwords, if we didn't change then their is high security risk. Use strong
password so nobody could guess your password.

Session Management Attacks
The big issue of Session Management is session id is passed in URL only. Attackers can acquire passwords
or session IDs to access user accounts and mimic their IDs if session management is not properly 
secured and managed. Attackers can imitate other users on the network, system, or application if 
session IDs are hacked.  This type of Attack is known as session hijacking.


Comments ()


Sign in

Read Next

Intrusion Detection System

Blog banner

Threat management

Blog banner

Getting to Kashmir: Alternative to the Jammu-Srinagar highway

Blog banner

A Review on Data Acquisition in Cyber Forensics

Blog banner

1.1 basic elements

Blog banner

Internet of Things

Blog banner

Starvation

Blog banner

TRIGGERS IN DATABASE

Blog banner

New Ransomware Encrypts Your Android And Then Changes PIN Lock

Blog banner

Man is free by the birth .

Blog banner

NIKE

Blog banner

Human Error: The weakest link in Cybersecurity

Blog banner

Sweet and Sour Mango Pickle (Gol Keri)

Blog banner

Email Privacy

Blog banner

Some web vulnerabilities

Blog banner

VIRTUAL MEMORY

Blog banner

Operating System

Blog banner

Cybersecurity Standards for Automotive

Blog banner

Dancing Classes In Mumbai

Blog banner

A BLOG ON MYSQL

Blog banner

How International Schools Build Global-Minded Students through Curriculum & Activities

Blog banner

SESSION HIJACKING

Blog banner

How Unstructured Play Helps Children Become Creative Thinkers

Blog banner

Operating system evolution

Blog banner

Man VS Nature

Blog banner

Music is life

Blog banner

Paralysis/Paralysis Stroke

Blog banner

Uniprocessor Scheduling

Blog banner

Apache Spark :- Powerful Data Processing Tool

Blog banner

Service Design Principles

Blog banner

Music helps reduce stress

Blog banner

Service tax applied on sanitary pads and not condoms

Blog banner

Unlocking Success: Mastering Google Ads Strategies

Blog banner

MODERN OPERATING SYSTEMS

Blog banner

How Cyber Forensics help prevent Crimes

Blog banner

The Memory Hierarchy

Blog banner

Security Breaches in Stock market trading

Blog banner

GIS Topography

Blog banner

AOL Mail

Blog banner

Concurrency:Deadlock and Starvation

Blog banner

MACHINE LEARNING

Blog banner

Direct Memory Access

Blog banner