Identification and Authentication Failures
Flaw or lack of proper verification of user's identity before granting access to a system or application. Involves issues of managing session controls, weak password policies, missing MFA, and unprotected brute-force attacks, among others.
Here is a typical example of this vulnerability as follows:
A website manages sessions with an ID but is weak and guessable. If we go to the Inspect>Application>Cookies tab, we can check for the session ID
Sometimes we can find patterns in the generation of the IDs, for example, that the generation is time-based. In this case, we can see that the IDs are generated based on the seconds that have passed
A standard for this is often the number of seconds from January 1st of 1970 (Unix Standard). We can check this with a simple calculation as follows:
Is common also to use ID generated with well-known hashes
Last updated
Was this helpful?