Companies Home Search Profile

OWASP Top 10: Authentication vulnerabilities ~2023

Focused View

Foyzul Islam

1:20:18

185 View
  • 1 - Introduction.mp4
    02:26
  • 2 - All methods.mp4
    25:11
  • 3 - Vulnerable Authentication Logic.mp4
    13:44
  • 4 - Multifactor Authentication.mp4
    29:07
  • 5 - Burp Suite.mp4
    07:08
  • 6 - Its me.mp4
    02:42
  • Description


    Vulnerabilities in authentication and authorization | Learn with Fun way

    What You'll Learn?


    • About Authentication vulnerabilities
    • Weak Login Credentials
    • Username Enumeration
    • HTTP Basic Authentication
    • Poor Session Management
    • Staying Logged In
    • SQL Injection
    • Unsecure Password Change and Recovery
    • Flawed Two-Factor Authentication
    • Vulnerable Authentication Logic
    • Human Negligence

    Who is this for?


  • How wants to Learn Authentication vulnerabilities
  • How wants to Learn SQL Injection
  • How Loves Web Application penetration testing
  • How Wants to be Bug Bounty Hunter
  • How wants to practice OWASP Top 10
  • More details


    Description

    A vulnerability assessment is a systematic review of security weaknesses in an information system. It evaluates if the system is susceptible to any known vulnerabilities, assigns severity levels to those vulnerabilities, and recommends remediation or mitigation, if and whenever needed.


    The OWASP Top 10 provides rankings of—and remediation guidance for—the top 10 most critical web application security risks. Leveraging the extensive knowledge and experience of the OWASP's open community contributors, the report is based on a consensus among security experts from around the world.


    What is broken authentication?

    Broken authentication is a widely used term reflecting a combination of vulnerabilities related to authentication and flawed implementations of session management functionalities. It lets threat agents exploit weaknesses in session and credentials management implementations.

    It is the second most prevalent and impactful vulnerability as per the OWASP “Top 10” list.


    What is the difference between authentication and authorization?

    Authentication is the process of verifying that a user really is who they claim to be, whereas authorization involves verifying whether a user is allowed to do something.


    why need to learn authentication vulnerabilities?

    Authentication vulnerabilities have serious repercussions — whether it's because of weak passwords or poor authentication design and implementation. Malicious users can use these vulnerabilities to get access into systems and user accounts to: Steal sensitive information. Masquerade as a legitimate user.


    Types of broken authentication attacks

    > Session hijacking attack

    > Session ID URL rewriting attack

    > Session fixation attack


    How to prevent broken authentication attacks

    • Control session length

    • Rotate and invalidate session IDs

    • Do not put session IDs in URLs

    Who this course is for:

    • How wants to Learn Authentication vulnerabilities
    • How wants to Learn SQL Injection
    • How Loves Web Application penetration testing
    • How Wants to be Bug Bounty Hunter
    • How wants to practice OWASP Top 10

    User Reviews
    Rating
    0
    0
    0
    0
    0
    average 0
    Total votes0
    Focused display
    Category
    Foyzul Islam
    Foyzul Islam
    Instructor's Courses
    My name is Paplu Ahmed, I am an Ethical Hacker, Programmer and CTF Lover. I just love hacking and breaking the rules, but don’t get me wrong as I said I am an ethical hacker.Paplu Ahmed is a Penetration Tester with over 4 years of experience in Ethical Hacking and Problem Solving. He started learning hacking and programming on his own from a young age. Now he is working successfully on popular sites like HackerOne, bugCrowed, ctftime, hackerrank, codeforces.As a tutor, he joined Udemy, the world's largest online learning platform, in 2023. He joined as an instructor to spread his experience and skills among the people. Prior to this, he has been teaching offline for more than 1.5 year
    Students take courses primarily to improve job-related skills.Some courses generate credit toward technical certification. Udemy has made a special effort to attract corporate trainers seeking to create coursework for employees of their company.
    • language english
    • Training sessions 6
    • duration 1:20:18
    • Release Date 2023/03/15