15.3 Broken Authentication and Session Management Flashcards

1
Q

What is validation bypass?

A

Validation bypass is one form of **broken access control**, which OWASP lists as the fifth most commonly used attack vector.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What can attackers do by using validation bypass?

A

Attackers can use validation bypass breaches to assume the identity of users or administrators with escalated privileges, allowing them to create, access, update, or delete data.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Security code analysis tools and vulnerability scanning tools can detect an absence of access control. However, they lack the ability to ____________.

A

Security code analysis tools and vulnerability scanning tools can detect an absence of access control. However, they lack the ability to verify the functionality of existing security controls.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What causes weak control mechanisms?

A

Weak access control mechanisms result from a lack of automated detection and a lack of proper testing by application developers.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What are mitigation strategies for validation bypass? (4)

A
  • Implicitly deny all (except public resources).
  • Reuse access control mechanisms after implementation.
  • Disable web server directory listings and ensure backup files are not present in web roots.
  • Ensure logging of all access control failures and immediate generation of alerts.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is the second most common attack vector on the OWASP top 10? What is it?

A

**Broken Authentication**

Broken authentication is an umbrella term for several vulnerabilities that attackers exploit to impersonate legitimate users online

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What inadequacies can lead to vulnerable web applications and infrastructure? (8)

A
  • Allowing use of well-known passwords, or weak or default passwords.
  • Inefficient password recovery mechanisms.
  • Unencrypted passwords or weak hashes.
  • Absence of multifactor authentication.
  • Exposure of session ID in the URL.
  • Non-rotation of session IDs after each use.
  • Improper session invalidation or timeouts.
  • Inadequate security built into web application software
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is one specific broken authentication attack?

A

**watering hole attack**

Attackers observe or guess the websites that users from a targeted organization visit most often. They will then try to infect that site with malware in order to infect as many users as possible, leading to a network breach.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What are the best strategies for preventing and mitigating broken authentication and session management flaws?(2)

A
  1. The best strategies for preventing and mitigating broken authentication and session management flaws will depend on the particular scope of the application.
  2. Supplementary mitigation tools include credential management systems like LastPass and OneLogin provide features for using and storing credentials in a secure and controllable way.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What are the 4 factors of multifactor authentication?

A
  1. Standard login inputs (password, PIN, cognitive questions)
  2. Physical keys (smartcard, hard token)
  3. Biometrics (iris/retina scan, hand geometry)
  4. Location (GPS detection, callback to a home phone number)
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

__________ restricts what users can see and do based on their privileges.

A

**Constrained user interface**

  • This can result in grayed-out or missing menu items or other interface changes.
  • Context-dependent controls regulate activity-based functions, such as limiting your ability to perform certain tasks, like editing a document.
  • Content-dependent controls regulate the content of an object, such as grayed-out menu items.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What is Polyinstantiation?

A

“scrambles” the storage of information at different classification levels, preventing hackers from understanding the information without the missing pieces.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

How should APIs be used?

A

They should always be stored in secure locations and transmitted only over encrypted communications channels.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Alternative mitigation strategies for broken authentication and session management include: (4)

A
  • Random generation of session IDs makes it difficult for an attacker to brute force or guess valid session IDs.
  • Enforce session timeouts or session ID expirations based on a predetermined amount of time.
  • Use robust password recovery mechanisms.
  • Enforce complex passwords.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Exposure of session ID in the URL is called what web vulnerability and how would you mitigate?

A

Broken Session Management

Prevent the exposure of session information in the URL and enforce session invalidation or timeouts.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Cookies are typically sent using a type of encoding called?

A

base64

17
Q

Explain Base64

A

Base64 is an encoding scheme that represents a binary set of data in an ASCII format.

18
Q
A