{"id":1999,"date":"2020-09-10T12:12:47","date_gmt":"2020-09-10T06:42:47","guid":{"rendered":"https:\/\/www.tikaj.com\/?p=1999"},"modified":"2021-07-25T10:25:04","modified_gmt":"2021-07-25T04:55:04","slug":"owasp-top-10-explained-broken-authentication","status":"publish","type":"post","link":"https:\/\/www.tikaj.com\/blog\/owasp-top-10-explained-broken-authentication\/","title":{"rendered":"OWASP TOP 10 Explained: Broken Authentication"},"content":{"rendered":"\n

Broken Authentication is the second most important flaw in the ranking of OWASP Top 10. Using this loophole, an attacker may take control of the device user accounts. In the worst case, they may be helped to gain full mastery of the system.<\/p>\n\n\n\n

The probability of broken authentication is not limited to a fixed attack pattern or a particular code flaw. User functions related to authentication and session management are frequently improperly enforced, allowing attackers to manipulate passwords, keys, or session tokens, or leverage other design vulnerabilities to presume the identity of other users on a temporary or permanent basis.<\/p>\n\n\n\n

Broken Authentication Examples:<\/strong><\/h2>\n\n\n\n

Credential Stuffing<\/h3>\n\n\n\n

The intruder has a common set of default passwords and usernames in Credential Stuffing. They will use this list to manipulate the passwords to sign in to legal passwords. It is advised that users change their default usernames and passwords to be safe against these attacks. An intruder can also create a list of Custom Passwords through different tools in Linux, such as CRUNCH, based on his previous target knowledge.<\/em><\/p>\n\n\n\n

\"\"<\/a><\/figure>\n\n\n\n

<\/p>\n\n\n\n

Unhashed Passwords<\/h3>\n\n\n\n

A shift of clear-text password to encrypted words from which an attacker may be fooled is called password hashing. What an attacker does so that an intruder will intercept a user request since all of them are on the same network. One can lose Account Permission & Secrecy using this strategy.<\/p>\n\n\n\n

<\/p>\n\n\n\n

Misconfigured Session Timeouts<\/h3>\n\n\n\n

The case where the user logs out of the account and the intruder has the user’s key. You can still have access to that account using the session key. These glitches are referred to as Misconfigured Client Timeout.<\/p>\n\n\n\n

<\/p>\n\n\n\n

How to prevent of Broken authentication attacks?<\/h2>\n\n\n\n

Enable Multi-Factor Authentication<\/h3>\n\n\n\n

Multi-Factor Authentication (MFA) is a security mechanism that needs more than one authentication process from different categories of token to validate the identity of the user for a login or other operation. <\/em>MFA blends two or three professional credentials:<\/p>\n\n\n\n