Back to Attacks Guide
Broken Authentication cover

Broken Authentication
Medium

Broken Authentication allows attackers to compromise passwords, keys, or session tokens to assume users' identities.

Attack Overview
Key information about Broken Authentication

Broken Authentication allows attackers to compromise passwords, keys, or session tokens to assume users' identities.

Common Tools:

  • Hydra
  • Burp Suite Intruder
  • Ncrack
  • Medusa

Test Your Knowledge
Take a quick quiz about Broken Authentication

What is the primary goal of a Broken Authentication attack?

Which of the following is NOT a common technique used in Broken Authentication attacks?

What is a recommended prevention method for Broken Authentication attacks?

Difficulty
Medium
Primary Targets

Web applications, databases, authentication systems

OWASP Top 10

Ranked in the OWASP Top 10 Web Application Security Risks