20.3.3. Improper Authentication

0.0(0)
studied byStudied by 0 people
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
Card Sorting

1/3

flashcard set

Earn XP

Description and Tags

20.3. Application Attacks

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

4 Terms

1
New cards

Improper Authentication

When an application fails to properly verify a user’s identity before allowing access to sensitive actions or data.

2
New cards

Examples of Improper Authentication

- Accessing authenticated pages (e.g., all_posts.php) without logging in.

- No rate limiting on OTP (One-Time Password) fields → attacker can try all 4-digit codes (brute force).

- OTPs or passwords accepted even without verifying the user.

3
New cards

🛡 Why is Improper Authentication dangerous?

- Can lead to account takeovers, data breaches, and unauthorized access.

4
New cards

🔧 Mitigations for Improper Authentication:

- Enforce authentication before access to any protected resource.

- Add rate limiting (e.g., max tries per minute).

- Use CAPTCHAs to stop bots.

- Implement Multi-Factor Authentication (MFA).

- Use trusted third-party authentication services (OAuth, SSO).

- Test regularly for authentication bypass flaws.