wisemonkeys logo
FeedNotificationProfileManage Forms
FeedNotificationSearchSign in
wisemonkeys logo

Blogs

Broken Authentication Attacks

profile
18_prachi Kandalkar
Oct 20, 2021
0 Likes
0 Discussions
93 Reads


Broken Authentication is related to login page, to broke the authentication of the web application its a vulnerability in the login page broken authentication is divided into two parts:-
1)Credential Stuffing: As if any web application data gets leak so attackers use the username and 
password to login any more others account and try to get the confidential information. To avoid this 
attacks can use two factor authentication.
2)Default Password:- A default password is a device usual preconfigured password. Several devices run 
pre-configured with such passwords, if we didn't change then their is high security risk. Use strong
password so nobody could guess your password.

Session Management Attacks
The big issue of Session Management is session id is passed in URL only. Attackers can acquire passwords
or session IDs to access user accounts and mimic their IDs if session management is not properly 
secured and managed. Attackers can imitate other users on the network, system, or application if 
session IDs are hacked.  This type of Attack is known as session hijacking.


Comments ()


Sign in

Read Next

Policies for Service Transition

Blog banner

S-Tool : Steganography

Blog banner

Elegant fashion style

Blog banner

Types Of scheduling

Blog banner

Starvation

Blog banner

CONCURRENCY: MUTUAL EXCLUSION AND SYNCHRONIZATION-het karia

Blog banner

The art of being alone

Blog banner

Virtual Machine

Blog banner

Memory Management in an Operating System

Blog banner

Threats To Computer System

Blog banner

Python as a tool for Data science task & project

Blog banner

Memory management

Blog banner

Cloud Computing: Threats and Vulnerabilities

Blog banner

Docker Framework

Blog banner

Why Time Management Is the Secret to College Success (and How to Master It)

Blog banner

Access management

Blog banner

Penetration Testing

Blog banner

Privacy LAWs in IT

Blog banner

Buffering

Blog banner

Mutual exclusion

Blog banner

Challenges of Digital forensics in cloud computing environment

Blog banner

The Memory Hierarchy

Blog banner

Virtual Machine

Blog banner

Gamer life

Blog banner

Animal’s have my heart

Blog banner

Craziness of dream 11 and how it impacts on our life

Blog banner

Operating system

Blog banner

Predictive Analytics: How Data Science Predicts Trends(Weather ,Stock Market,Sales Forecasting ).

Blog banner

15 Interesting Facts about India

Blog banner

Explain website hacking issues

Blog banner

Why is online marketing is important in current scenario

Blog banner

Buffering

Blog banner

DNS Cache

Blog banner

semaphores

Blog banner

Cyber Attacks -- Trends Patterns and Security Countermeasures

Blog banner

Direct Memory Access

Blog banner

What is Data, Information and Knowledge?

Blog banner

Crypto tax evasion

Blog banner

Jira Software

Blog banner

Fashion design

Blog banner

The Features of Blockchain

Blog banner

Vulnerabilities in OnePlus Devices

Blog banner