wisemonkeys logo
FeedNotificationProfileManage Forms
FeedNotificationSearchSign in
wisemonkeys logo

Blogs

Broken Authentication Attacks

profile
18_prachi Kandalkar
Oct 20, 2021
0 Likes
0 Discussions
93 Reads


Broken Authentication is related to login page, to broke the authentication of the web application its a vulnerability in the login page broken authentication is divided into two parts:-
1)Credential Stuffing: As if any web application data gets leak so attackers use the username and 
password to login any more others account and try to get the confidential information. To avoid this 
attacks can use two factor authentication.
2)Default Password:- A default password is a device usual preconfigured password. Several devices run 
pre-configured with such passwords, if we didn't change then their is high security risk. Use strong
password so nobody could guess your password.

Session Management Attacks
The big issue of Session Management is session id is passed in URL only. Attackers can acquire passwords
or session IDs to access user accounts and mimic their IDs if session management is not properly 
secured and managed. Attackers can imitate other users on the network, system, or application if 
session IDs are hacked.  This type of Attack is known as session hijacking.


Comments ()


Sign in

Read Next

How to lose belly fat

Blog banner

Mesh Topology

Blog banner

THE ROLE OF CYBER FORENSICS IN CRIMINOLOGY

Blog banner

Memory Management

Blog banner

Benefits of Yoga

Blog banner

Protect yourself from System Hacking with these Simple Steps

Blog banner

How to Avoid being a Victim of Cybercrime

Blog banner

CyberSecurity Color Wheel

Blog banner

Introduction to Solidity Programming for Blockchain Development

Blog banner

Flipkart

Blog banner

Self managing devices

Blog banner

POSITIVE ATTITUDE IN LIFE

Blog banner

Memory Management - operating system

Blog banner

PERSONAL STORIES

Blog banner

Importance Of Time

Blog banner

Electronic Funds Transfer

Blog banner

Article on team management software

Blog banner

IS CONVERTING AMBITION INTO PROFESSION?

Blog banner

Service Design Model

Blog banner

EVOLUTION OF THE MIRCOPROCESSOR

Blog banner

Malware Defense

Blog banner

My 1stNull Puliya session

Blog banner

CRISP-DM Methodology

Blog banner

It's all about our Brain.- The Brain Metaphor

Blog banner

IoT Architecture Based Security

Blog banner

MailChimp

Blog banner

Why Extreme Opinions Are Rising: Psychological Insights into Society’s Divides

Blog banner

What is Packet Filtering?

Blog banner

Deadlock in Operating System

Blog banner

Cyber Security Standards

Blog banner

Deadlock and Starvation

Blog banner

Information Technology In E- Commerce

Blog banner

VIRUS

Blog banner

You'll get to know about Pankaj Negi

Blog banner

Traditional Unix System

Blog banner

RAID

Blog banner

Assignment 2

Blog banner

RSA (Rivest-Shamir-Adelman) Algorithm

Blog banner

Number Guessing game --lisp

Blog banner

ART AND CULTURE OF VRINDAVAN

Blog banner

operating system

Blog banner

The Role of Cyber Forensics in Criminology

Blog banner