Wiki
search
⌘Ctrlk
Wiki
  • Introduction
  • πŸ‘ΎPenetration Testing
    • Application Security
    • Infrastructure Security
    • SSL/TLS Security
    • Secure Code Review
    • Cloud Security
    • Social Engineering
    • Tool Usage
    • Errors and Solutions
    • Scoping
    • OSINT
  • ⌨️Programming
    • Automation
    • Python
  • 🌐Miscellaneous
    • Scripts
    • Favourite Reads/Links
    • Hacking Posters
    • Windows Developer VMs
    • Windows Workspaces
    • GitHub Pages
    • Interview Prep
    • CVSS Formula
    • Android Rooting
    • Presentation Slides
  • 🐞Vulnerability Wiki
    • 🌐APPLICATION LEVEL
      • πŸ”’AUTHENTICATION
        • Authentication Bypass
        • Lack of Password Confirmation
        • 2FA Code Brute-forceable
        • Lack of Verification
        • Lack of Throttling on Form Submissions
        • Lack of Rate Limiting on Login
        • Weak Password Complexity Rules
        • πŸ–₯️SESSION MANAGEMENT
        • πŸ”‘ACCESS CONTROL
      • πŸ”’INPUT VALIDATION
      • βž—CRYPTOGRAPHY
      • πŸ“‰LOGGING
      • πŸ“•DATA PROTECTION
      • πŸ“²COMMUNICATION
      • πŸ‘¨β€πŸ’»MALICIOUS CODE
      • πŸ’‘LOGIC
      • πŸ—„οΈFILE UPLOAD
      • βš™οΈAPI ISSUES
      • πŸ”CONFIGURATIONS
    • πŸ’ΎINFRASTRUCTURE LEVEL
gitbookPowered by GitBook
block-quoteOn this pagechevron-down
  1. 🐞Vulnerability Wikichevron-right
  2. 🌐APPLICATION LEVEL

πŸ”’AUTHENTICATION

Authentication Bypasschevron-rightLack of Password Confirmationchevron-right2FA Code Brute-forceablechevron-rightLack of Verificationchevron-rightLack of Throttling on Form Submissionschevron-rightLack of Rate Limiting on Loginchevron-rightWeak Password Complexity Ruleschevron-rightπŸ–₯️SESSION MANAGEMENTchevron-rightπŸ”‘ACCESS CONTROLchevron-right
PreviousAPPLICATION LEVELchevron-leftNextAuthentication Bypasschevron-right

Last updated 3 years ago