Broken AuthenticationMedium
Broken Authentication allows attackers to compromise passwords, keys, or session tokens to assume users' identities.
Educational Purpose Only
Broken Authentication allows attackers to compromise passwords, keys, or session tokens to assume users' identities.
Common Tools:
- Hydra
- Burp Suite Intruder
- Ncrack
- Medusa
Web applications, databases, authentication systems
Ranked in the OWASP Top 10 Web Application Security Risks
SSRF allows attackers to induce the server to make requests to unintended locations.
Unrestricted file upload vulnerabilities allow attackers to upload malicious files to a server, potentially leading to remote code execution.
XSS attacks inject malicious scripts into web pages viewed by other users.
Race conditions occur when the behavior of a system depends on the sequence or timing of uncontrollable events, potentially leading to unexpected results.