Broken Authentication
User Enumeration
Using Nmap (Replace target.com and port with your target)
Using Wfuzz (Replace USERNAME_LIST with a wordlist)
Brute-Forcing Passwords
Using Hydra (Replace username, password_list, and target)
Using Hashcat (For Offline Password Cracking)
Brute-Forcing Password Reset Tokens
Using Wfuzz (Replace TOKEN_LIST)
Brute-Forcing 2FA Codes
Using a Custom Script (Python Example)
Bypassing Brute-Force Protection (X-Forwarded-For)
Using Curl (Modify Headers)
Session Attacks
Brute-Forcing Cookies (Using Wfuzz, Very Time Consuming)
(Replace COOKIE_LIST)
Example of Session Fixation
Attacker Sets Session ID:
Then coerces the victim to use that same session ID.
Additional Examples
Nmap Scan
Directory Brute Force
SQLMap Scan
Nikto Scan
Burp Suite Intruder Attack for Fuzzing
Burp Suite is a GUI tool but provides many command-line options.
Categories of Authentication
Knowledge
Passwords, PINs, Security Questions.
Password complexity policies, password storage (hashing, salting), and password managers.
Ownership
ID Cards, TOTP (Time-based One-Time Password), Hardware Tokens.
The TOTP algorithm, U2F/FIDO2 keys, and smart cards.
Inherence
Biometric Authentication (Fingerprint, Facial Recognition, Iris Scan).
Accuracy and security of different biometric methods, vulnerabilities like spoofing.
Brute-Force Attacks
User Enumeration
Identifying valid usernames.
Common techniques include response time analysis, error message analysis, and social engineering.
Brute-Forcing Passwords
Trying multiple password combinations.
Dictionary attacks, hybrid attacks, and rainbow table attacks. Tools like Hydra and Hashcat.
Brute-Forcing Password Reset Tokens
Trying different reset token values.
Weak or predictable token generation exploitation.
Brute-Forcing 2FA Codes
Trying many 2FA code combinations.
Time window vulnerabilities, rate limiting importance.
Bypassing Brute-Force Protection
Rate Limit
X-Forwarded-For HTTP Header Manipulation.
Other header manipulations and distributed brute-force attacks.
CAPTCHAs
Looking for CAPTCHA solutions in HTML code.
CAPTCHA bypass techniques and machine learning for solving.
Password Attacks
Default Credentials
Changing default credentials immediately.
Vulnerable Password Reset
Issues: Guessable security questions, username injection in reset requests.
Importance of strong security questions and robust reset mechanisms.
Authentication Bypasses
Accessing Protected Pages Directly
Improper access control vulnerabilities.
Manipulating HTTP Parameters
Parameter tampering and SQL injection.
Session Attacks
Brute-Forcing Cookies with Insufficient Entropy
Importance of cryptographically secure session ID generation.
Session Fixation
Attacker obtains a valid session identifier.
Attacker coerces the victim to use this session identifier (social engineering).
Victim authenticates to the vulnerable web application.
Attacker hijacks the victim's session.
Prevention: Regenerating session IDs after login.
Improper Session Timeout
Sessions should expire after an appropriate time interval.
Best practices for session timeout management and secure session storage.
Additional Considerations
MFA Implementation Flaws: Weak MFA can lead to vulnerabilities.
WAF Bypasses: Attackers may bypass WAFs to exploit authentication vulnerabilities.
OAuth/OpenID Connect Vulnerabilities: Misconfigurations can lead to account takeover.
JWT Vulnerabilities: Weak validation can result in security issues.
SSO Vulnerabilities: Weak SSO implementations can compromise multiple applications.
Client-Side Vulnerabilities: Storing sensitive data locally, client-side validation bypasses.
Last updated