Authentication plays a crucial role in web application security. In this course, Web App Hacking: Hacking Authentication, you'll learn about different types of vulnerabilities in an authentication mechanism. First, you'll explore how the attacker can bypass password verification with SQL injection, and how they can learn a user's password with dictionary attack. Next, you'll cover how your credentials can be disclosed over an insecure channel when HTTPS is insecurely implemented in the web application. Additionally, you'll discover how the attacker can impersonate you when the session ID isn't regenerated at the time of authentication, and how the attacker can learn who is registered in the web application. Finally, you'll dive into industry best practices related to the authentication mechanism. By the end of the course, you'll know how to test web applications for various authentication flaws and how to provide countermeasures for these problems.
Learning Objectives
- SQL Injection
- Dictionary Attack
- HTTPS Enforcement
- Session Regeneration
- User Enumeration
Framework Connections
Specialty Areas
- Vulnerability Assessment and Management
Feedback
If you would like to provide feedback for this course, please e-mail the NICCS SO at NICCS@hq.dhs.gov.