Hack Notes
GithubTwitterTryHackMeHackTheBox
  • Hack Notes
    • # whoami
  • 🕸️Web Application Security
    • Web Application Security Notes
      • SQL Injection
        • Basic Microsoft SQL injection Cheatsheet
        • Basic PostgreSQL injection Cheatsheet
        • Basic MySQL Injection Cheatsheet
        • Basic Oracle SQLi Cheatsheet
      • Authentication Vulnerabilities
        • Authentication Flaws Checklist
        • Authentication Vulnerability Practical
      • Directory Travarsal
        • Directory Traversal Lab
      • Command Injection
        • Command Injection Labs
      • Business logic flaws
        • Business Logic Vulnerabilities Labs
      • Information Disclosure
        • Information Disclosure Labs
      • Access Control
        • Broken Access Controls in Practice
      • File Upload Vulnerability
      • Server Side Request Forgery (SSRF)
      • XML External Entity Injections
      • Web Penetration Testing Tools
  • 📖Writeups
    • TryHackMe
      • The advent of Cyber 1 (2019)
      • THM Basic Pen-Testing Machine
      • THM Room CC: Pentesting
      • THM Machine DailyBugle
      • THM Machine Fortress
      • THM Machine Internal
      • THM Room: OWASP Top 10 Answers
      • THM Machine: Overpass
      • THM Machine: Overpass 2 - Hacked
      • THM Machine: Overpass 3 - Hosting
      • THM Room: Pickle Rick CTF
      • THM Machine Relevant
      • THM Machine: SkyNet
      • THM Room: Web Fundamentals
  • ☠️CNWPP
    • CNWPP
      • CNWPP Content
      • Week #1 Introduction to Pentest
      • Week #2 Pentesting Methodologies
      • Week #3 Network Pentesting
      • Week #4 Web Application Pentesting
  • 🏛️Active Directory (AD)
    • Active Directory Attacks
      • LLMNR Poisoning Attack
      • SMB Relay Attack
      • IPv6 Attacks
        • IPv6 Attack In Action
      • Kerberos
        • Kerberos Pre Authentication Attack
        • Kerberoasting
        • DCsync Attack
Powered by GitBook
On this page
  • Password-Based Login
  • Vulnerabilities in multi-factor authentication
  • Vulnerabilities in other authentication mechanisms

Was this helpful?

  1. Web Application Security
  2. Web Application Security Notes
  3. Authentication Vulnerabilities

Authentication Flaws Checklist

Password-Based Login

  • Check for Username and Password brute-forcing

  • Check for subtle changes in responses i.e Status Code, Error message, Response Time, etc.

  • Check for flawed brute forcing protection to bypass IP Blocking and Account locking to enumerate usernames and passwords.

  • Try brute forcing with rate limiting i.e try with some delays or bypassing the captcha.

  • Check for HTTP basic authentication without HSTS or exploitable using other vulnerabilities like CSRF or XSS

Vulnerabilities in multi-factor authentication

  • Skipping for 2FA i.e user is in a login state after reloading.

  • Check for 2FA bypass with another user cookie i.e go through the 2FA process with other user's cookies.

  • Brute-forcing 2FA verification codes and try to bypass any protection mentioned above to guess code.

Vulnerabilities in other authentication mechanisms

  • Try to reverse engineering the "Remember me" Cookie.

  • If the Resetting user password functionality exits try to reset another user's password and get its password.

  • Check if the website Sending passwords by email in a secure manner that protects it from MitM attacks and after the first login immediately changing the method is forced or not.

  • Check for guessable parameters in Reset password URLs and they correctly check for the token is stored in the server.

  • Check if the Reset tokens send by email are vulnerable to Reset Poisoning attacks

  • Changing passwords and usernames can be tested with the same techniques for password-based logins to enumerate or for password brute force.

PreviousAuthentication VulnerabilitiesNextAuthentication Vulnerability Practical

Last updated 2 years ago

Was this helpful?

🕸️