Checkliste zur Authentifizierung
Apr 26 2023
Hallo Leute, das ist meine Checkliste zum Überprüfen von Authentifizierungs-Schwachstellenangriffen [], Authentifizierungs-Geschäftslogik, Registrieren von Sicherheitslücken, Umgehen von 2fa, Idor. Alle Checklisten in diesem Repo https://github.com/Az0x7/vulnerability-Checklist folgen mir.
Hallo Leute, das ist meine Checkliste zur Überprüfung von Authentifizierungs-Schwachstellenangriffen
[ ] Authentifizierung
1. Check if post authentication URLs are directly accessible and do not have any session bound to it.
2. In case the URL is stolen/guessable/brute-forceable, it can lead to account takeover.
1. Bypass the CAPTCHA check by injecting a random value into the **X-Forwarded-For header
Test if password confirmation is necessary with these actions:
- Change Email Address
- Change Password
- Delete Account
- Manage 2FA
1. Check that during the registration process, an email verification is necessary
1. Send a form and intercept the request with Burp proxy
2. Send the request to intruder
3. Repeat sending the same request 20-30 times
4. Observe that all of these forms are sent without any restrictions
1. Go to login page and send the unsuccessful login attempt request to Burp Intruder
2. Change the password values for brute force as random values
3. Observe that the response to the 20 or 30th request doesn't change and the account is not locked.
1. Go to password reset/login/register or any other area that allows writing username or email address input
2. Write an existing username/email address with wrong password to observe error message
3. Write a non-existing username/email address to observe error message
4. See if error message leaks the information of the existence of username/email addresses
1. Change password to only numerical
2. Change password to only lower case
3. Change password to common passwords
4. Change password to short passwords
5. Observe that the application has weak or no password policy
1. Intercept the request during the registration to the application via Burp
2. Observe that registration request is sent over HTTP
1. search on login page
2. Send a form and intercept the request with Burp proxy
3. intercept the request with wireshark
4. make sure that the data transport is encryption or not
1. Status codes
2. Error messages
3. Response times
X-Forwarded-For:
1. Create a courier account or use existing one.
2. Confirm Your email address.
3. Now log out from your account and request for password reset code for your account .
4. Don't use the code that has been sent to your email address.
5. In new tab or new browser log in back to your account.
6. Go to account setting and change your password .
7. Now go to email and check the password reset code that we requested in step 3.
8. Change Your password using that reset password code .
9. You can see that your password has been changed.
1. Create a Phabricator account having email address "[email protected]".
2. Now Logout and ask for password reset link. Don't use the password reset link sent to your mail address.
3. Login using the same password back and update your email address to "[email protected]" and verify the same. Remove "[email protected]".
4. Now logout and use the password reset link which was mailed to "[email protected]" in step 2.
5. Password will be changed.you can read all my checklist vulnerability
business logic , register vulnerability , bypass 2fa , authentication
All checklist in this repo
https://github.com/Az0x7/vulnerability-Checklist
following me
linkedin , Twitter
Geschäftslogik , Schwachstelle registrieren , 2fa umgehen , Idor
Alle Checklisten in diesem Repo
https://github.com/Az0x7/vulnerability-Checklist
Folgen mir
- LinkedIn , Twitter

![Was ist überhaupt eine verknüpfte Liste? [Teil 1]](https://post.nghiatu.com/assets/images/m/max/724/1*Xokk6XOjWyIGCBujkJsCzQ.jpeg)



































