Published in


The OWASP top 10: A2 — .2017 Broken authentication


The OWASP Definition of broken authentication goes very deep and while this is not usually a problem for pentesters as they are required to pretty much report anything and let the customer decide what course of action to take. If we talk about bug bounty hunting though, these vulnerabilities are all useful to us as well, but maybe not immediately.

What OWASP means with broken authentication might differ from the definition most people have in their heads so let’s dive a bit deeper into what they…




Everything connected with Tech & Code. Follow to join our 900K+ monthly readers

Recommended from Medium

{UPDATE} كلمات كراش Hack Free Resources Generator

How payment works in remote interpretation in 2021

Take Care to Guard Against Those Out to Get You

Hooded person standing in the shadows.

Update your VIGOR DAC Profile

{UPDATE} Spy 3D - best shoot game Hack Free Resources Generator

OG Web3 interface MyCrypto adds support for decentralized infra provider Pocket Network

Why Your Network Isn’t Secure

Get the Medium app

A button that says 'Download on the App Store', and if clicked it will lead you to the iOS App store
A button that says 'Get it on, Google Play', and if clicked it will lead you to the Google Play store


No b*llshit Hacking tutorials with extreme value in short bursts

More from Medium

How “Docker” can help you become a better hacker

Just 7 Days Left for IWCON2022. Have You Registered Yet?

Attacking ARP: Learn Networking By Breaking Stuff For Bug Bounty Hunters, Penetration Testers, and…

An Introduction to Cross-Site Request Forgery