Liste de contrôle d'authentification
Apr 26 2023
Salut les gars, voici ma liste de contrôle pour vérifier l'attaque de vulnérabilité d'authentification [ ] logique métier d'authentification, enregistrer la vulnérabilité, contourner 2fa, Idor Toutes les listes de contrôle dans ce référentiel https://github.com/Az0x7/vulnerability-Checklist me suivant.
Salut les gars, voici ma liste de contrôle pour vérifier l'attaque de vulnérabilité d'authentification
[ ] authentification
1. Check if post authentication URLs are directly accessible and do not have any session bound to it.
2. In case the URL is stolen/guessable/brute-forceable, it can lead to account takeover.
1. Bypass the CAPTCHA check by injecting a random value into the **X-Forwarded-For header
Test if password confirmation is necessary with these actions:
- Change Email Address
- Change Password
- Delete Account
- Manage 2FA
1. Check that during the registration process, an email verification is necessary
1. Send a form and intercept the request with Burp proxy
2. Send the request to intruder
3. Repeat sending the same request 20-30 times
4. Observe that all of these forms are sent without any restrictions
1. Go to login page and send the unsuccessful login attempt request to Burp Intruder
2. Change the password values for brute force as random values
3. Observe that the response to the 20 or 30th request doesn't change and the account is not locked.
1. Go to password reset/login/register or any other area that allows writing username or email address input
2. Write an existing username/email address with wrong password to observe error message
3. Write a non-existing username/email address to observe error message
4. See if error message leaks the information of the existence of username/email addresses
1. Change password to only numerical
2. Change password to only lower case
3. Change password to common passwords
4. Change password to short passwords
5. Observe that the application has weak or no password policy
1. Intercept the request during the registration to the application via Burp
2. Observe that registration request is sent over HTTP
1. search on login page
2. Send a form and intercept the request with Burp proxy
3. intercept the request with wireshark
4. make sure that the data transport is encryption or not
1. Status codes
2. Error messages
3. Response times
X-Forwarded-For:
1. Create a courier account or use existing one.
2. Confirm Your email address.
3. Now log out from your account and request for password reset code for your account .
4. Don't use the code that has been sent to your email address.
5. In new tab or new browser log in back to your account.
6. Go to account setting and change your password .
7. Now go to email and check the password reset code that we requested in step 3.
8. Change Your password using that reset password code .
9. You can see that your password has been changed.
1. Create a Phabricator account having email address "[email protected]".
2. Now Logout and ask for password reset link. Don't use the password reset link sent to your mail address.
3. Login using the same password back and update your email address to "[email protected]" and verify the same. Remove "[email protected]".
4. Now logout and use the password reset link which was mailed to "[email protected]" in step 2.
5. Password will be changed.you can read all my checklist vulnerability
business logic , register vulnerability , bypass 2fa , authentication
All checklist in this repo
https://github.com/Az0x7/vulnerability-Checklist
following me
linkedin , Twitter
logique métier , enregistrer la vulnérabilité , contourner 2fa , Idor
Toutes les listes de contrôle dans ce dépôt
https://github.com/Az0x7/vulnerability-Checklist
me suivre
- LinkedIn , Twitter
![Qu'est-ce qu'une liste liée, de toute façon? [Partie 1]](https://post.nghiatu.com/assets/images/m/max/724/1*Xokk6XOjWyIGCBujkJsCzQ.jpeg)



































