Advertisement
Not a member of Pastebin yet?
Sign Up,
it unlocks many cool features!
- Now we're going to talk about broken authentication management...
- Attacks that are included in broken authentication management are:
- Brute force/Dictionary attack
- Session spotting/Sniffing
- Replay Attack
- Session Fixation Attack
- Session Hijacking
- Session Expiration
- I will guide you and explain all of them.
- Start with Brute force:
- It's where you try every single possible combination until you found the correct password, >hydra can be use online and hashcat to brute hashes
- Dictionary attack:
- Pretty same as Brute force, except this technique you use a wordlist of possible passwords, much faster >hydra and hashcat, same here
- Session spotting:
- Listen to the network traffic at IP level and wait until you see a session ID. and that cookie can be recognized as thelegitimate user on that application
- Replay attack:
- Listen to the network traffic and wait until you see username and password
- Session Fixation Attack:
- Attacker create a session on a web site, Sends a Request, Get a Response containing a cookie like (SESSION ID=1234abcd5678).
- Attacker needs to maintain this session alive (send requests regularly) Attacker sends this Session ID to the victim included in a phishing.
- Attacker sends an email like this.
- URL :http://www.gmail.com/?page=...&SESSION_ID=1234abcd
- And if he's logged in, or will log in, you will share the same cookie, ((he will login for you ;)))
- Session Hijacking:
- Simply you guess the session ID,
- Session Expiration:
- When you have shared computer and the session ID does not expire until the next guy visits the page
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement