Hello Everyone, Thank you so much for 1.2k Followers !
This is the Part 05 of the series, in the last part we discussed about Identity role testing.
In this part we are going to learn about Authentication Testing.
Every application needs an authentication mechanism for the users, but sometimes it can be bypassed, in this sections we are going to test this mechanism for any vulnerabilities.
Authentication is among the simplest of all the security mechanisms employed within web applications. In the typical case, a user supplies her username and password, and the application must verify that these items are correct. If so, it lets the user in. If not, it does not. Despite its apparent simplicity, devising a secure authentication function is a subtle business. In real-world web applications authentication often is the weakest link, which enables an attacker to gain unauthorized access.
Lets Begin The Testing
As you know most of websites have a set of rules for settings the password, For Example:
But some websites may not have these rules, or may have weak rules which allows the users to create weak passwords which can be guessed easily by the attacker, granting him or her unauthorized access to the application.
If the application allows an attacker to make repeated login attempts with different passwords until he guesses the correct one, it is highly vulnerable even to an amateur attacker who manually enters some common usernames and passwords into his browser.
In this situation, any attacker will use automated techniques to attempt to guess passwords, based on lengthy lists of common values. Given today’s bandwidth and processing capabilities, it is possible to make thousands of login attempts per minute from a standard PC and DSL connection.
For Example:
We are going to use this report: https://hackerone.com/reports/223337
Submitted by,
jaypatel to Weblate on April 24, 2017, 9:26am UTC
A typical login form requires a username and a password. If the login fails one of them is of course incorrect, but if the application tells you which of them is incorrect through an error message, this can be exploited.
For Example:
In this instance, you can use an automated attack to iterate through a large list of common usernames to enumerate which ones are valid. A list of enumerated usernames can be used as the basis for various subsequent attacks, including password guessing, attacks on user data or sessions, or social engineering.
We are going to use this report: https://hackerone.com/reports/1166054
Submitted by,
mohanad987 to UPchieve on April 15, 2021, 9:54pm UTC
Here the attacker submits a random email in the forgot password feature, then intercepts the request in burpsuite, he gets an error in the response stating “No account with that id found” which can be exploited to find the valid usernames.
Vulnerabilities that are deliberately avoided in the main login function often reappear in the password change function. Many web applications’ password change functions are accessible without authentication and do the following
Like password change functionality, mechanisms for recovering from a forgotten password situation often introduce problems that may have been avoided in the main login function, such as username enumeration.
A Basic Forgot Password mechanism looks like this:
We are going to use this report: https://hackerone.com/reports/1175081
Submitted by,
saajanbhujel to UPchieve on April 15, 2021, 9:54pm UTC
Here the users first goes to the reset password features, then enters the victims email address and intercepts the request, then in the request with the victims email also add your own email and then forward this request, now you will receive the password reset link and you can reset the victims password and take control over his account.
In the next blog we will learn about Attacking Session Management
If you have any queries free to dm me on instagram:
https://www.instagram.com/om._.arora1603/
Email: [email protected]
Twitter: https://x.com/om83418440
You can also connect with me on linkedin:
https://www.linkedin.com/in/om-arora-b88340213/
Please Consider following and liking if you found it helpful.
You can also support me through: