Advertisement
--DSR--

F: auth manage

May 18th, 2017
132
0
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
text 1.55 KB | None | 0 0
  1. Now we're going to talk about broken authentication management...
  2. Attacks that are included in broken authentication management are:
  3. Brute force/Dictionary attack
  4. Session spotting/Sniffing
  5. Replay Attack
  6. Session Fixation Attack
  7. Session Hijacking
  8. Session Expiration
  9.  
  10. I will guide you and explain all of them.
  11.  
  12. Start with Brute force:
  13. It's where you try every single possible combination until you found the correct password, >hydra can be use online and hashcat to brute hashes
  14.  
  15. Dictionary attack:
  16. Pretty same as Brute force, except this technique you use a wordlist of possible passwords, much faster >hydra and hashcat, same here
  17.  
  18. Session spotting:
  19. Listen to the network traffic at IP level and wait until you see a session ID. and that cookie can be recognized as thelegitimate user on that application
  20.  
  21. Replay attack:
  22. Listen to the network traffic and wait until you see username and password
  23.  
  24. Session Fixation Attack:
  25. Attacker create a session on a web site, Sends a Request, Get a Response containing a cookie like (SESSION ID=1234abcd5678).
  26. Attacker needs to maintain this session alive (send requests regularly) Attacker sends this Session ID to the victim included in a phishing.
  27. Attacker sends an email like this.
  28. URL :http://www.gmail.com/?page=...&SESSION_ID=1234abcd
  29. And if he's logged in, or will log in, you will share the same cookie, ((he will login for you ;)))
  30.  
  31. Session Hijacking:
  32. Simply you guess the session ID,
  33.  
  34. Session Expiration:
  35. When you have shared computer and the session ID does not expire until the next guy visits the page
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement