Building authentication and session management schemes correctly is a difficult task often presenting flaws that may be equally difficult to identify. Common authentication attacks consist of brute force, insufficient authentication, and weak password recovery validation. These types of attacks target and attempt to exploit the authentication process a website uses to verify the identity of a user, service, or application. This course teaches how to execute attacks, identify vulnerabilities, and verify controls.
Learning Objectives
On successful completion of this course, learners should have the knowledge and skills to:
- Identify common authentication vulnerabilities
- Verify authentication controls
- Execute dictionary attacks
Framework Connections
Specialty Areas
- Vulnerability Assessment and Management
Feedback
If you would like to provide feedback for this course, please e-mail the NICCS SO at NICCS@hq.dhs.gov.