Training
Broken Authentication

Training Overview
The "Broken Authentication" training is designed to enhance your cybersecurity skills. This comprehensive training details common vulnerabilities in authentication processes and explains how these vulnerabilities can be exploited. Additionally, it provides information on effective measures to prevent such vulnerabilities.
The training content covers various authentication methods, username enumeration, default credentials, protection deficiencies against brute force attacks, cookies, and more in detail.
What You Will Learn
- How to identify common broken authentication vulnerabilities.
- Techniques for username enumeration and exploiting default credentials.
- How to analyze and exploit weak cookie implementations.
- Methods for preventing and mitigating authentication flaws.
Who is this for?
- Web Penetration Testers.
- Web Developers and Application Security Engineers.
- Bug Bounty Hunters.
Prerequisites
- Basic understanding of web applications and HTTP.
- Familiarity with a web proxy like Burp Suite is recommended.
Tools You Will Use
- Burp Suite or similar web proxy
- Username and password wordlists
Training Sections
- Introduction
- Authentication Methods
- Gathering Information on Usernames
- Default Credentials
- Lack of Brute-Force Protection
- Weak Cookies
- Object Injection (Mass Assignment)
- Application
- Preventing Broken Authentication Vulnerabilities
- Exam