TST 360 - Penetration Testing for Authentication Vulnerabilities
Building authentication and session management schemes correctly is a difficult task often presenting flaws that may equally difficult to Identify. Common authentication attacks consist of brute force, insufficient authentication, and weak password recovery validation. These types of attacks target and attempt to exploit the authentication process a website uses to verify the identity of a user, service, or application. This course teaches how to execute attacks, identify vulnerabilities, and verify controls.
After completing this course, you will be able to:
- Identify common authentication vulnerabilities
- Verify authentication controls
- Execute dictionary attacks