wisemonkeys logo
FeedNotificationProfileManage Forms
FeedNotificationSearchSign in
wisemonkeys logo

Blogs

Broken Authentication Attacks

profile
18_prachi Kandalkar
Oct 20, 2021
0 Likes
0 Discussions
93 Reads


Broken Authentication is related to login page, to broke the authentication of the web application its a vulnerability in the login page broken authentication is divided into two parts:-
1)Credential Stuffing: As if any web application data gets leak so attackers use the username and 
password to login any more others account and try to get the confidential information. To avoid this 
attacks can use two factor authentication.
2)Default Password:- A default password is a device usual preconfigured password. Several devices run 
pre-configured with such passwords, if we didn't change then their is high security risk. Use strong
password so nobody could guess your password.

Session Management Attacks
The big issue of Session Management is session id is passed in URL only. Attackers can acquire passwords
or session IDs to access user accounts and mimic their IDs if session management is not properly 
secured and managed. Attackers can imitate other users on the network, system, or application if 
session IDs are hacked.  This type of Attack is known as session hijacking.


Comments ()


Sign in

Read Next

Stories Woven in Silk: The Meaning Behind Patola Motifs

Blog banner

Steganography and Steganalysis

Blog banner

Memory management

Blog banner

INTERNET

Blog banner

TRAIN TRAVELING

Blog banner

Race Condition in Operating Theatre

Blog banner

BrainGate Technology

Blog banner

Deadlock

Blog banner

Concurrency and memory

Blog banner

social media issue

Blog banner

Demystifying Cryptography: A Beginner's Guide

Blog banner

Save Environment

Blog banner

Explain the concept of ( MIS) Management information systems

Blog banner

File management In Operating System

Blog banner

Virus

Blog banner

WAKE UP ITS FOOD o'CLOCK...!!!!!

Blog banner

PYTHON

Blog banner

virtual machine

Blog banner

Drawing tips for a beginner

Blog banner

Knowledge Management in Continual Service improvement (CSI)

Blog banner

Deadlock and Starvation

Blog banner

Way to make your meal healthier.

Blog banner

MAJOR ACHIEVEMENTS OF OS

Blog banner

MUTUAL EXCLUSION

Blog banner

Self defence

Blog banner

DEVELOPMENTS LEADING TO MODERN OPERATING SYSTEMS

Blog banner

Modern Operating system

Blog banner

Method of Evaluating Information Security Level in an Organization

Blog banner

How to make Pancakes

Blog banner

GIS in Mapping and landslide alert in Bangladesh

Blog banner

Deadlock in operating system

Blog banner

Mental Health

Blog banner

Kernel Memory Allocation In Linux.

Blog banner

Corporate Discipline.

Blog banner

Dos (Denial of service) Attack

Blog banner

Why Should You Schedule Tweets on Twitter?

Blog banner

Amazon

Blog banner

Virtual memory in windows

Blog banner

Carrot Pickle With Raisins (lagan Nu Achar)

Blog banner

WHAT IS SNAPCHAT AND HOW DOES IT WORK?

Blog banner

Data Warehouse Bus Matrix

Blog banner

Firewall in Computer Network

Blog banner