0% found this document useful (0 votes)
336 views1 page

Admin Login: A2:2017-Broken Authentication WSTG-CONF-05 Enumerate Infrastructure and Application Admin Interfaces

This document provides a challenge to find and exploit broken authentication on a website by logging in as an admin user. It discusses how broken authentication is widespread due to issues with identity and access controls as well as session management. The document instructs the user to use source code observation to find an admin password and login in order to submit credentials and gain unauthorized access.

Uploaded by

student
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
336 views1 page

Admin Login: A2:2017-Broken Authentication WSTG-CONF-05 Enumerate Infrastructure and Application Admin Interfaces

This document provides a challenge to find and exploit broken authentication on a website by logging in as an admin user. It discusses how broken authentication is widespread due to issues with identity and access controls as well as session management. The document instructs the user to use source code observation to find an admin password and login in order to submit credentials and gain unauthorized access.

Uploaded by

student
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 1

Challenge List

Admin Login
A2:2017-Broken Authentication

WSTG-CONF-05 Enumerate Infrastructure and Application Admin Interfaces

The prevalence of broken authentication is widespread due to the design and implementation of
most identity and access controls. Session management is the bedrock of authentication and
access controls, and is present in all stateful applications.
Attackers can detect broken
authentication using manual means and exploit them using automated tools with password lists
and dictionary attacks.

Use your powers of page source observation and find admin password and login.

Login as admin user

User Name :
Password :
Submit

You might also like