- Unencrypted Connections: If the connection being used between the User and the Web Application is not encrypted, the attacker can see the data being transmitted. This means that All Information being transferred and received between the user and the site can be intercepted without the User’s Consent / Knowledge.
- Encourage Users to Have Strong Passwords: Weak username and passwords are easily guessed by attackers to get unauthorized access.
- Expire Sessions Quickly: Application session NOT discarded after a certain amount of time or even after logging out.
- Implement Login Rate Limiting, Lockout’s and Hashing Passwords: If stored passwords are stolen by unauthorized individual, if no protection is given and values would be visible in plain text.
- Session ID Used in URL: Session ID value is transmitted in the URL where attacker can
see that, which fails to protect session ID value.
Example -
http://192.168.242.137/login.jsp?sessionid=abc12345df
Find Attack Demonstartion Video here
Application Name - bWApp
Attack Video -
A2.-.Broken.Authentication.mp4