The OWASP Collection — Broken Authentication

Insecure Authentication and Session Management Functionality

image by author

Continuing with our OWASP collection of articles, today we’re covering the second vulnerability on OWASPs Top 10: Broken Authentication.

Broken authentication is exactly as it sounds; it exists when authentication and session management within a given web…




Dark Roast Security’s mission is to inspire, educate, and share ideas about InfoSec. Follow to join our community!

Recommended from Medium

Dark Side 117: Using Sqlmap for Database Takeover

Redlike (Redis Exploitation) — HacktivityCon 2021 CTF

Join OEC Metaverse Carnival — Experience CyberCat & Share $30,000 in Prizes!

Country Blocking in Magneto Made Easy With These Steps

{UPDATE} Minds of Nations Hack Free Resources Generator

How does a crypto wallet work?

Beware of growing COVID-19 scams: 5 tips to spot these online scams and stay safe

April|Dante Network Fortnightly Report 04.01–04.14, 2022

Get the Medium app

A button that says 'Download on the App Store', and if clicked it will lead you to the iOS App store
A button that says 'Get it on, Google Play', and if clicked it will lead you to the Google Play store
Katlyn Gallo

Katlyn Gallo

Coffee lover, bookworm, and InfoSec enthusiast | | Find me on Twitter & Instagram: @ktgblogstech

More from Medium

Hack the Box: Active Write-Up

OAuth Pen Testing: Part 3

Securing Your Linux Installation

Secure Software Summit Series: Focus on Preventative Readiness