SlideShare a Scribd company logo
AUTHENTICATION
Security Mechanism:
Authentication
Authorization
Session Management
Data Validation
Error Handling
Logging
Encryption
Authentication Core Concepts
Something you
know
Something you
have
Something you
are
A manner for identifying a user is who they claim to be.
Two-Factor Authentication
Leverage two of these methods for a single authentication transaction.
Authentication Words to Live By
 Enforce basic password security
 Implement an account lockout for failed logins
 “Forgot my password” functionality can be a problem
 For web applications, use and enforce POST method
Authentication Words to Live By: #1
Enforce basic password security
• Minimum length enforcement
• Require complex composition
• Should not contain the user name as a
substring
• Users must be able to change password
• Consider password expiration over time
• Prevent reuse of some previous passwords
when changed
Real World Example - Twitter
Good practices
 Minimum password length = 8
 Passwords must contain characters from three of the following
four categories:
– uppercase characters (A through Z)
– lowercase characters (a through z)
– base 10 digits (0 through 9)
– non-alphabetic characters (for example, !, $, #, %)
 Password must not contain the user's account name
 Maximum password age = 6 months
 Minimum password age = 1 day
 Password history = 12 passwords remembered
Authentication Words to Live By: #2
 The problem
– The software does not implement sufficient measures to prevent
multiple failed authentication attempts within in a short time frame,
making it more susceptible to brute force attacks.
Implement an account lockout for failed logins
Real World Example - Twitter
Real World Example - eBay
A famous example of this type of weakness being exploited is the
eBay attack. eBay always displays the user id of the highest
bidder. In the final minutes of the auction, one of the bidders could
try to log in as the highest bidder three times. After three incorrect
log in attempts, eBay password throttling would kick in and lock
out the highest bidder's account for some time. An attacker could
then make their own bid and their victim would not have a chance
to place the counter bid because they would be locked out. Thus
an attacker could win the auction.
Mitigations:
 Shorten the length of account lockout
 Don't show who the highest bidder is
 Don't expose user id, only expose name
o Name should never be used as a key
Authentication Words to Live By: #3
 The problem
– The software contains a mechanism for users to recover or change
their passwords without knowing the original password, but the
mechanism is weak.
“Forgot my password” functionality can be a problem
Real World Example – Yahoo! & Sarah Palin
Yahoo! email used three security questions:
1. Birthday
2. Zip code
3. Where she met her husband
Real World Example – Apple iForgot
1) iforgot.apple.com – enter Apple ID
2) Select authentication method – “answer security questions”
3) Enter date of birth
4) Answer two security questions
5) Enter new password
6) Password is reset
Knowing someone’s Apple ID and DOB would
allow construction of the URL after step #5.
--------
The exploit was published on the day that Apple launched two-factor authentication
for Apple ID accounts, which would have prevented the attack for anyone that had
enabled it. Once activated, the feature replaces the security question based
verification with a 4-digit code sent to the user's mobile device
Good practices
 Make sure any security question is hard to guess and hard
to find the answer.
 The system must only email the new password to the email
account of the user resetting their password.
 Assign a new temporary password rather than revealing the
original password and force the user to set a new one.
 Avoid sending the password via email, but rather send a
reset link with a unique token with enough entropy and with
a short lifespan
 Consider throttling the rate of password resets so that a
legitimate user can not be denied service by an attacker that
tries to recover the password in a rapid succession.
Authentication Words to Live By: #4
 The problem
– The web application uses the GET method to process requests that
contain sensitive information, which can expose that information
through the browser's history, referrers, web logs, and other
sources.
For web applications, use and enforce POST method
Real World Example – Watchguard SSL-VPN

More Related Content

PPTX
Password management
PPTX
Preventions of Email Hacking
PPTX
Email hacking
PPT
Password Management
PPTX
Identity Theft - by LINKS Technology
PPTX
Webspoofing
PDF
Security provisions
PPT
Defcon9 Presentation2001
Password management
Preventions of Email Hacking
Email hacking
Password Management
Identity Theft - by LINKS Technology
Webspoofing
Security provisions
Defcon9 Presentation2001

What's hot (11)

PPT
Train Employees to Avoid Inadvertent Cyber-Security Breaches
PPTX
The strategies of password
PPSX
Internet security terms and definitions
PDF
Hackingppt 160730081605
PPTX
Parameter tampering
PPTX
PDF
Cybersecurity Awareness Infographics
PPTX
Internet trolls
PPT
Security Tech Talk
PPT
Web Application Security
DOCX
hire a hacker
Train Employees to Avoid Inadvertent Cyber-Security Breaches
The strategies of password
Internet security terms and definitions
Hackingppt 160730081605
Parameter tampering
Cybersecurity Awareness Infographics
Internet trolls
Security Tech Talk
Web Application Security
hire a hacker
Ad

Similar to 04 application security fundamentals - part 2 - security mechanisms - authentication (20)

PDF
How to Find and Fix Broken Authentication Vulnerability
PDF
An Enhanced Security System for Web Authentication
PDF
Yours Advance Security Hood (Yash)
PPT
Email and web security
PDF
The Immune System of Internet
PPTX
eBay's Big "Whoops": What Others Can Learn From It
PDF
Password reset email best Practices
PDF
"Inter- application vulnerabilities. hunting for bugs in secure applications"...
PDF
How to choose a password that’s hard to crack
PPTX
Improving Password Based Security
PPTX
Flaws of password-based authentication
PDF
CNIT 129S - Ch 6a: Attacking Authentication
PPTX
ORIENTATION ON CYBERSECURITY AND MICROSOFT 365 ADOPTION.pptx
PPTX
ORIENTATION ON CYBERSECURITY AND MICROSOFT 365 ADOPTION.pptx
PPTX
How to Protect Yourself From Heartbleed Security Flaw
PPT
Web security presentation
PPTX
7 Email Security Best Practices You Need to Follow in 2023.pptx
PPTX
Cybersecurity-Awareness-Month-2024_Cobranded-and-Accessible.pptx
PPTX
Authentication and session v4
PDF
INSTAGRAM – HACKING AND PREVENTION TIPS
How to Find and Fix Broken Authentication Vulnerability
An Enhanced Security System for Web Authentication
Yours Advance Security Hood (Yash)
Email and web security
The Immune System of Internet
eBay's Big "Whoops": What Others Can Learn From It
Password reset email best Practices
"Inter- application vulnerabilities. hunting for bugs in secure applications"...
How to choose a password that’s hard to crack
Improving Password Based Security
Flaws of password-based authentication
CNIT 129S - Ch 6a: Attacking Authentication
ORIENTATION ON CYBERSECURITY AND MICROSOFT 365 ADOPTION.pptx
ORIENTATION ON CYBERSECURITY AND MICROSOFT 365 ADOPTION.pptx
How to Protect Yourself From Heartbleed Security Flaw
Web security presentation
7 Email Security Best Practices You Need to Follow in 2023.pptx
Cybersecurity-Awareness-Month-2024_Cobranded-and-Accessible.pptx
Authentication and session v4
INSTAGRAM – HACKING AND PREVENTION TIPS
Ad

More from appsec (12)

PPTX
23 owasp top 10 - resources
PPTX
15 owasp top 10 - a3-xss
PPTX
12 owasp top 10 - introduction
PPTX
10 application security fundamentals - part 2 - security mechanisms - encry...
PPTX
11 application security fundamentals - part 2 - security mechanisms - summary
PPTX
09 application security fundamentals - part 2 - security mechanisms - logging
PPTX
08 application security fundamentals - part 2 - security mechanisms - error...
PPTX
06 application security fundamentals - part 2 - security mechanisms - sessi...
PPTX
07 application security fundamentals - part 2 - security mechanisms - data ...
PPTX
05 application security fundamentals - part 2 - security mechanisms - autho...
PPTX
02 application security fundamentals - part 1 - security priciples
PPTX
01 Application Security Fundamentals - part 1 - introduction and goals
23 owasp top 10 - resources
15 owasp top 10 - a3-xss
12 owasp top 10 - introduction
10 application security fundamentals - part 2 - security mechanisms - encry...
11 application security fundamentals - part 2 - security mechanisms - summary
09 application security fundamentals - part 2 - security mechanisms - logging
08 application security fundamentals - part 2 - security mechanisms - error...
06 application security fundamentals - part 2 - security mechanisms - sessi...
07 application security fundamentals - part 2 - security mechanisms - data ...
05 application security fundamentals - part 2 - security mechanisms - autho...
02 application security fundamentals - part 1 - security priciples
01 Application Security Fundamentals - part 1 - introduction and goals

Recently uploaded (20)

PDF
NewMind AI Weekly Chronicles - August'25 Week I
PDF
Diabetes mellitus diagnosis method based random forest with bat algorithm
DOCX
The AUB Centre for AI in Media Proposal.docx
PPTX
Spectroscopy.pptx food analysis technology
PDF
Blue Purple Modern Animated Computer Science Presentation.pdf.pdf
PPTX
Digital-Transformation-Roadmap-for-Companies.pptx
PDF
Approach and Philosophy of On baking technology
PDF
7 ChatGPT Prompts to Help You Define Your Ideal Customer Profile.pdf
PDF
Advanced methodologies resolving dimensionality complications for autism neur...
PPTX
VMware vSphere Foundation How to Sell Presentation-Ver1.4-2-14-2024.pptx
PDF
TokAI - TikTok AI Agent : The First AI Application That Analyzes 10,000+ Vira...
PPTX
Cloud computing and distributed systems.
PPT
Teaching material agriculture food technology
PPTX
Big Data Technologies - Introduction.pptx
PDF
Encapsulation theory and applications.pdf
PPTX
20250228 LYD VKU AI Blended-Learning.pptx
PDF
Build a system with the filesystem maintained by OSTree @ COSCUP 2025
PDF
Peak of Data & AI Encore- AI for Metadata and Smarter Workflows
PDF
Optimiser vos workloads AI/ML sur Amazon EC2 et AWS Graviton
PDF
Chapter 3 Spatial Domain Image Processing.pdf
NewMind AI Weekly Chronicles - August'25 Week I
Diabetes mellitus diagnosis method based random forest with bat algorithm
The AUB Centre for AI in Media Proposal.docx
Spectroscopy.pptx food analysis technology
Blue Purple Modern Animated Computer Science Presentation.pdf.pdf
Digital-Transformation-Roadmap-for-Companies.pptx
Approach and Philosophy of On baking technology
7 ChatGPT Prompts to Help You Define Your Ideal Customer Profile.pdf
Advanced methodologies resolving dimensionality complications for autism neur...
VMware vSphere Foundation How to Sell Presentation-Ver1.4-2-14-2024.pptx
TokAI - TikTok AI Agent : The First AI Application That Analyzes 10,000+ Vira...
Cloud computing and distributed systems.
Teaching material agriculture food technology
Big Data Technologies - Introduction.pptx
Encapsulation theory and applications.pdf
20250228 LYD VKU AI Blended-Learning.pptx
Build a system with the filesystem maintained by OSTree @ COSCUP 2025
Peak of Data & AI Encore- AI for Metadata and Smarter Workflows
Optimiser vos workloads AI/ML sur Amazon EC2 et AWS Graviton
Chapter 3 Spatial Domain Image Processing.pdf

04 application security fundamentals - part 2 - security mechanisms - authentication

  • 2. Authentication Core Concepts Something you know Something you have Something you are A manner for identifying a user is who they claim to be. Two-Factor Authentication Leverage two of these methods for a single authentication transaction.
  • 3. Authentication Words to Live By  Enforce basic password security  Implement an account lockout for failed logins  “Forgot my password” functionality can be a problem  For web applications, use and enforce POST method
  • 4. Authentication Words to Live By: #1 Enforce basic password security • Minimum length enforcement • Require complex composition • Should not contain the user name as a substring • Users must be able to change password • Consider password expiration over time • Prevent reuse of some previous passwords when changed
  • 5. Real World Example - Twitter
  • 6. Good practices  Minimum password length = 8  Passwords must contain characters from three of the following four categories: – uppercase characters (A through Z) – lowercase characters (a through z) – base 10 digits (0 through 9) – non-alphabetic characters (for example, !, $, #, %)  Password must not contain the user's account name  Maximum password age = 6 months  Minimum password age = 1 day  Password history = 12 passwords remembered
  • 7. Authentication Words to Live By: #2  The problem – The software does not implement sufficient measures to prevent multiple failed authentication attempts within in a short time frame, making it more susceptible to brute force attacks. Implement an account lockout for failed logins
  • 8. Real World Example - Twitter
  • 9. Real World Example - eBay A famous example of this type of weakness being exploited is the eBay attack. eBay always displays the user id of the highest bidder. In the final minutes of the auction, one of the bidders could try to log in as the highest bidder three times. After three incorrect log in attempts, eBay password throttling would kick in and lock out the highest bidder's account for some time. An attacker could then make their own bid and their victim would not have a chance to place the counter bid because they would be locked out. Thus an attacker could win the auction. Mitigations:  Shorten the length of account lockout  Don't show who the highest bidder is  Don't expose user id, only expose name o Name should never be used as a key
  • 10. Authentication Words to Live By: #3  The problem – The software contains a mechanism for users to recover or change their passwords without knowing the original password, but the mechanism is weak. “Forgot my password” functionality can be a problem
  • 11. Real World Example – Yahoo! & Sarah Palin Yahoo! email used three security questions: 1. Birthday 2. Zip code 3. Where she met her husband
  • 12. Real World Example – Apple iForgot 1) iforgot.apple.com – enter Apple ID 2) Select authentication method – “answer security questions” 3) Enter date of birth 4) Answer two security questions 5) Enter new password 6) Password is reset Knowing someone’s Apple ID and DOB would allow construction of the URL after step #5. -------- The exploit was published on the day that Apple launched two-factor authentication for Apple ID accounts, which would have prevented the attack for anyone that had enabled it. Once activated, the feature replaces the security question based verification with a 4-digit code sent to the user's mobile device
  • 13. Good practices  Make sure any security question is hard to guess and hard to find the answer.  The system must only email the new password to the email account of the user resetting their password.  Assign a new temporary password rather than revealing the original password and force the user to set a new one.  Avoid sending the password via email, but rather send a reset link with a unique token with enough entropy and with a short lifespan  Consider throttling the rate of password resets so that a legitimate user can not be denied service by an attacker that tries to recover the password in a rapid succession.
  • 14. Authentication Words to Live By: #4  The problem – The web application uses the GET method to process requests that contain sensitive information, which can expose that information through the browser's history, referrers, web logs, and other sources. For web applications, use and enforce POST method
  • 15. Real World Example – Watchguard SSL-VPN