Skip to content

Latest commit

 

History

History
52 lines (36 loc) · 1.66 KB

File metadata and controls

52 lines (36 loc) · 1.66 KB

🐝 O W A S P

This is the TOP vulnerabilities topics listed in the OWASP

💉 SQL INJECTION

select * from Usuarios where email='"+ email + "'and senha='"+ senha + " ' ";

INJECTION
'or 1=1#

select * from Usuarios whre email=''or 1=1#'and senha='32425435453'

PREVENTION

  • Sanitization API

⛓ BROKEN AUTHENTICATION

When the website allow weak passwords

  • Bruteforce Wordlist (with common passwords)

  • Credential stuffing (exposed databases)

  • Exposed cookies / ids in the URL

  • 🎫 SESSION HIJACKING

  • If the website permits bruteforce tentatives or weak passwords

  • If the recovery methods is weak (knowledge-based aswers)

  • If the website not encrypt the passwords (bcrypt)

  • If the administrator panel has default passwords

PREVENTION

  • Not allow weak passwords ex: "password"
  • Password Captcha
  • Multi factor authentication
  • Limit login tentatives
  • Disable default administrative passwords
  • Password validation (NIST 800-63 Memorized Secrets)

🎲 DATA EXPOSURE

  • NOT SEND PASSWORDS IN THE URL
  • HTTPs in login / credential forms (main in the middle attacks)

DIRECTORY LISTING

  • If the website not block directory paths