18

Click here to load reader

Web Application Security 101 - 06 Authentication

Embed Size (px)

DESCRIPTION

In part 6 of Web Application Security 101 we will look into vulnerabilities effecting the authentication system. You will learn about password bruteforce attacks, cracking captures, bypassing the login system and more.

Citation preview

Page 1: Web Application Security 101 - 06 Authentication

AuthenticationBreaking through the front door.

Page 2: Web Application Security 101 - 06 Authentication

Types Of AuthenticationStandard: Basic, Digest, HTLM.

Custom: Login Forms, APIs, OpenID, OAuth, etc.

Page 3: Web Application Security 101 - 06 Authentication

Types Of VulnerabilitiesInformation Leakage

Default Password

Account Bruteforce

Password Reset Abuse

Authentication Bypass

Man-in-the-middle (MITM)

Denial Of Service (DoS)

Page 4: Web Application Security 101 - 06 Authentication

Information LeakageUsername enumeration via error messages.

Usernames are public information: e.g. sharepoint.

Usernames can be guessed: e.g. firstname.lastname.

Page 5: Web Application Security 101 - 06 Authentication

Default PasswordsAvailable in product manuals and online.

Guessing attacks by combining org name, etc.

Install the product to check for hidden accounts.

Page 6: Web Application Security 101 - 06 Authentication

Account BruteforceTrying various username/password combinations.

Changing between horizontal and vertical bruteforce.

Page 7: Web Application Security 101 - 06 Authentication

Account LockoutThe number of incorrect attempts allowed before locking the account.

When accounts can be locked indefinitely this means Denial of Service.

The application needs to employ captchas plus temporary account lockouts.

Page 8: Web Application Security 101 - 06 Authentication

Case SensitivityAccounts may not be case sensitive at all.

This increases the chances of successful bruteforce.

Page 9: Web Application Security 101 - 06 Authentication

Password Reset AbuseDepending how it is implemented it may be used for account hijack attacks.

Probably vulnerable if relays on security questions as they are easy to guess.

Page 10: Web Application Security 101 - 06 Authentication

Hacking Webmail 101An exercise of how well you know the victim.

Page 11: Web Application Security 101 - 06 Authentication

Authentication BypassA-to-C.

SQL injection.

Business logic flaws.

Page 12: Web Application Security 101 - 06 Authentication

A-to-CTypical in some home rounters.

Works like this: a, b (skipping), c.

Page 13: Web Application Security 101 - 06 Authentication

SQL InjectionTypical attacks like ' or 1=1--.

SELECT username,password WHERE username='' or 1=1--' AND PASSWORD=''

Page 14: Web Application Security 101 - 06 Authentication

Business Logic FlawsAny logic flow that can be used to bypass the login.

Cookie: is_authenticated=1

Page 15: Web Application Security 101 - 06 Authentication

Man-in-the-middle (MITM)Works by attacking the network layer.

tcpdump -A -i en1tcpflow -i en1

Require ARP poisoning, DNS hijacking and other low-level network attacks.

Page 16: Web Application Security 101 - 06 Authentication

Denial Of Services (DoS)Works by locking out all accounts.

Most effective if there is no automated account unlock process.

Page 17: Web Application Security 101 - 06 Authentication

To SummarizeThere are many ways to authenticated.

Some methods are typically weaker than others.

Some applications support more than one ways to authenticate.

There are many types of attack like bruteforce, bypass, MITM and DoS.

Page 18: Web Application Security 101 - 06 Authentication

LabLet's try some of these attacks for real.