cookie

ما از کوکی‌ها برای بهبود تجربه مرور شما استفاده می‌کنیم. با کلیک کردن بر روی «پذیرش همه»، شما با استفاده از کوکی‌ها موافقت می‌کنید.

avatar

Hãçkêrs Unite

Learn hacks ,tips and tricks become an elite hacker today👨‍💻💫

نمایش بیشتر
پست‌های تبلیغاتی
3 021
مشترکین
-224 ساعت
-167 روز
+7430 روز
توزیع زمان ارسال

در حال بارگیری داده...

Find out who reads your channel

This graph will show you who besides your subscribers reads your channel and learn about other sources of traffic.
Views Sources
تجزیه و تحلیل انتشار
پست هابازدید ها
به اشتراک گذاشته شده
ديناميک بازديد ها
01
Media files
2940Loading...
02
This was done on Windows 10 specifically
2941Loading...
03
✳️ How to Prevent Users from Changing Proxy Settings on Windows ➖➖➖➖➖➖➖➖➖➖➖➖➖    💠 To disable proxy changing, we are going to use the Local Group Policy editor. The process might look complicated, but it’s super easy if you follow it step-by-step. 🔹Step 1: First of all, click on the Start button and search for ‘gpedit.msc’ 🔹Step 2: Now click on the Edit Group Policy from the list options. 🔹Step 3: On the Local Group Policy Editor, head to the following path: User Configuration > Administrative Templates > Windows Components > Internet Explorer 🔹Step 4: On the right pane, double click on the ‘Prevent Changing Proxy settings’ 🔹Step 5: In the new Window that opens, select the ‘Enabled’ option. Once done, click on the ‘Ok’ button to apply the changes.    ✅ That’s it! You are done. Now the option to change the proxy settings will no longer be available for users. Keep supporting us❤️,             ➖@hackersworldunited ➖
2942Loading...
04
Are you available ? 🤔
1390Loading...
05
Media files
4480Loading...
06
✳️ NETWORKING BASICS: part-1 ✳️ ➖➖➖➖➖➖➖➖➖➖➖➖➖➖ 🔴 IP Addresses 💠 Internet Protocol address is the abbreviation of IP address. 💠 Each digital device (computer, laptop, phone, tablet, etc.) is assigned an IP address, and this is what enables us to communicate and connect with devices. Imagine an IP address as similar to your house address. Without that address, no one could find you or send you snail mail. 💠 The IP address system we are presently using is known as IP version 4, or IPv4.  It is made up of 32 bits of four octets, or four groups of 8 bits (on/off switches). 💠For instance, 192.168.1.101. Each of the numbers between the periods (.) is the decimal equivalent of 8 bits. This means that we calculate the base 2 number that computers use represented by the 8 bits and convert them to decimal numbers that humans are more accustomed to working with. Each one of the octets (8 bits) is capable of representing numbers within the range 0 through 255 (2 to the 8th power). ✳️ Classes of IP Addresses: 💠 IP addresses are generally put into three classes, and the ranges are: 🔹Class A: 0.0.0.0 - 127.255.255.255 🔹 Class B: 128.0.0.0 - 191.255.255.255 🔹 Class C: 192.0.0.0 - 223.255.255.255 💠 Later, we will address subnetting and subnet masks that vary with these different IP classes. ✳️ Public vs. Private IP Addresses 💠 It's important to note that our IP address system has its limitations. The biggest limitation is that there are not enough IP addresses to cover all of the devices that need to connect to the internet. The IPv4 system that we are working with now has only 4.3 billion IP addresses. With 7.3 billion people on the planet and far more devices, that certainly is not enough. 💠 As a result, a system was developed to reuse a group of IP addresses to be used within a LAN—and are not usable over the internet. These addresses can be used over and over again within each local area network, but not over the internet, thereby conserving the number of IP addresses necessary to keep the world going 'round. ✅ These private addresses include: 🔹192.168.0.0 - 192.168.255.255 🔹10.0.0.0 - 10.255.255.255 🔹172.16-.0.0 - 172.16.255.255 ✅ You have probably seen the private IP addresses beginning with 192.168.xxx.xxx or 10.xxx.xxx.xxx on your Kali system when you type ifconfig. 💠 This is your private IP that is only usable on the local area network. To communicate over the internet, it must be translated to a public IP by a NAT device (will see NAT in the next post.. stay tuned). ➖➖➖➖➖➖➖➖➖➖➖➖➖➖ Keep supporting us❤️ @hackersworldunited
4208Loading...
07
Media files
5970Loading...
08
✳️ How do you prevent broken authentication vulnerabilities? 💠 In order to avoid broken authentication vulnerabilities, make sure the developers apply to the best practices of website security. Support them by providing access to external security audits and enough time to properly test the code before deploying to production. 💠 OWASP’s technical recommendations are the following: 🔹 Where possible, implement multi-factor authentication to prevent automated, credential stuffing, brute force, and stolen credential reuse attacks. 🔹 Do not ship or deploy with any default credentials, particularly for admin users. 🔹 Implement weak-password checks, such as testing new or changed passwords against a list of the top 10,000 worst passwords. 🔹 Align password length, complexity and rotation policies with NIST 800-63 B’s guidelines in section 5.1.1 for Memorized Secrets or other modern, evidence-based password policies. 🔹 Ensure registration, credential recovery, and API pathways are hardened against account enumeration attacks by using the same messages for all outcomes. 🔹 Limit or increasingly delay failed login attempts. Log all failures and alert administrators when credential stuffing, brute force, or other attacks are detected. 🔹Use a server-side, secure, built-in session manager that generates a new random session ID with high entropy after login. Session IDs should not be in the URL. Ids should also be securely stored and invalidated after logout, idle, and absolute timeouts. Will continue the other vulns. shortly.. stay tuned ➖➖➖➖➖➖➖➖➖➖➖➖➖➖ Keep supporting us❤️ @hackersworldunited
5621Loading...
09
✳️ Types of Broken Authentication Vulnerabilities 💠 According to the OWASP Top 10, these vulnerabilities can come in many forms. A web application contains a broken authentication vulnerability if it: 🔹Permits automated attacks such as credential stuffing, where the attacker has a list of valid usernames and passwords. 🔹 Permits brute force or other automated attacks. 🔹 Permits default, weak, or well-known passwords, such as”Password1″ or “admin/admin.″ 🔹 Uses weak or ineffective credential recovery and forgot-password processes, such as “knowledge-based answers,” which cannot be made safe. 🔹 Uses plain text, encrypted, or weakly hashed passwords. 🔹 Has missing or ineffective multi-factor authentication. 🔹 Exposes session IDs in the URL (e.g., URL rewriting). 🔹 Does not rotate session IDs after successful login. 🔹 Does not properly invalidate session IDs. User sessions or authentication tokens (particularly single sign-on (SSO) tokens aren’t properly invalidated during logout or a period of inactivity. ✳️ Writing insecure software results in most of these vulnerabilities. They can be attributed to many factors, such as lack of experience from the developers. It can also be the consequence of more institutionalized failures such as lack of security requirements or organizations rushing software releases, in other words, choosing working software over secure software.
4671Loading...
10
✳️ Broken Authentication ➖➖➖➖➖➖➖➖➖➖➖➖➖➖ 💠 A broken authentication vulnerability can allow an attacker to use manual and/or automatic methods to try to gain control over any account they want in a system – or even worse – to gain complete control over the system. 💠 Websites with broken authentication vulnerabilities are very common on the web. Broken authentication usually refers to logic issues that occur on the application authentication’s mechanism, like bad session management prone to username enumeration – when a malicious actor uses brute-force techniques to either guess or confirm valid users in a system. 💠To minimize broken authentication risks avoid leaving the login page for admins publicly accessible to all visitors of the website: 🔹/administrator on Joomla!, 🔹 /wp-admin/ on WordPress, 🔹 /index.php/admin on Magento, 🔹 /user/login on Drupal. 💠 The second most common form of this flaw is allowing users to brute force username/password combination against those pages.
4201Loading...
11
Media files
6310Loading...
12
✳️ Top 3 Best Free Malware Removal Tools for Windows ➖➖➖➖➖➖➖➖➖➖➖➖➖➖ 🔹 Bitdefender Malware Removal Tool 👉 It is the best malware removal tool that gives you additional security to shield your computer from any threats out there. Essentially, this software is fit for filtering every single document that might be harmful to your PC. In this way, Bitdefender encourages you to eliminate the malware that could damage your computer. 🔹Adware Antivirus Free Edition 👉This one is a little bit different compared to all others. It follows the IP based filtering system to block spam traffic. That means it scans the root file of the downloads and tells you beforehand whether the file has malware or not. 🔹 Malwarebytes Anti-Malware Tool 👉 For those who don’t know, Malwarebytes is right now the leading Anti-malware tool available out there for computers/laptops. Millions of users use the malware removal tool to safeguard their computers against potential threats like malware, virus, spyware, adware etc ✅ Security Is very much important in Hacking field so, protect yourself from malwares with these free softwares Keep supporting us❤️         ➖@hackersworldunited ➖
6103Loading...
13
Media files
7190Loading...
14
🔴 Continuation of the Basic linux commands 🔴 ➖➖➖➖➖➖➖➖➖➖➖➖➖➖ ✳️ cp — Use the cp command to copy files through the command line. It takes two arguments: The first is the location of the file to be copied, the second is where to copy. ✳️ mv — Use the mv command to move files through the command line. We can also use the mv command to rename a file. For example, if we want to rename the file “text” to “new”, we can use “mv text new”. It takes the two arguments, just like the cp command. ✳️ cat — Use the cat command to display the contents of a file. It is usually used to easily view programs ✳️ zip, unzip — Use zip to compress files into a zip archive, and unzip to extract files from a zip archive. ✳️ uname — Use uname to show the information about the system your Linux distro is running. Using the command “uname -a” prints most of the information about the system. This prints the kernel release date, version, processor type, etc. ➖➖➖➖➖➖➖➖➖➖➖➖➖➖ Keep supporting us❤️ @hackersworldunited
7282Loading...
15
📊 Trending Channels List •••••• 🥳 - Free Netflix Accounts Here ⭐️ - Free Hacked Apps 😍 - Best Wallpaper Channel •••••• 📲 - Hacking Tools & Apps 😱 - Desktop Wallpapers 🛑 - Money+Hacking+DarkWeb 😱 - Mind Blowing Facts •••••• Ⓜ️ - Free Premium Courses 💵 - Premium Apps 🎈 - Only Minimalist Wallpapers 💟 - Spirituality | Mind | Soul •••••• 📲 - Paid Apps + Softwares 🧑‍💻 - Become a Hacker Today 🔆 - Phone Wallpapers 💡 - Deep Thoughts ••••••
2200Loading...
16
Media files
9181Loading...
17
Media files
85211Loading...
18
💠 Step 5:- Now type the following command to connect with victim mobile 🔹 Ex: Connect 192.168.1.25 💠 here connect is a command and IP address is victim mobile's ip.. 💠 Stpe 6:- once u get connected., Exploit as u like😁.. type help to get all commands. ⚠️ Note: There are lots of exploits here you can do with that Android device. This is just one of the method which need victims mobile.. we can also do without touching the victims mobile.. i will teach that later just stay tuned 🔹 If you want to use PhoneSploit Over WAN just use Port Forwarding ➖➖➖➖➖➖➖➖➖➖➖➖➖➖ Keep supporting us❤️ @hackersworldunited
95714Loading...
19
💠 Step 1:- Go to "about phone" in settings and then tap 7 times on Build Number. 💠 Step 2:- go back to the setting and now you can see, there will be an Option called "developer options". click on that and then Enable USB Debugging. 🔹 Now connect the Android device via USB cable and allow the USB Debbuging when prompt. To verify the connection is successful or not, execute the following command 🔹 adb devices (It will shows the list of device attached) 🔹 Now You Can Remove USB cable and give back the victim's Mobile. 💠 Step 4:- Now we can run Ghost Framework from any where in our terminal by only the ghost command: 🔹 ghost And the ghost will appear with its main menu as the following screenshot
90013Loading...
20
✳️Procedure: ➖➖➖➖➖➖➖➖➖➖➖➖➖➖ 💠 Step 1:- Open a terminal and then Install the ADB using the following command 🔹 Sudo apt-get update 🔹 Sudo apt-get install android-tools-adb 🔹 Sudo apt-get install android-tools-fastboot (Just use sudo for the first command then u can ignore the sudo for the rest) ✳️ Step 2:- Clone the Ghost Framework from GitHub by using following command: 👉 git clone https://github.com/entynetproject/ghost Wait untill it gets download. 💠 Step 3:- Then we go the ghost directory by using cd command: 🔹 Cd ghost 💠 Step 4:- Now we need to install it using the installer script. Before that we give the permission to the installer script by applying following command: 🔹 Sudo chmod +× install.sh 💠 Step 5:- Now we can run the installer script using following command: 🔹 Sudo ./install.sh 🔹 Then wit will start installing the dependencies and this process will take some time depending on your internet speed. 🔥⚠️ Now Everything is installed Lets Start exploiting
74014Loading...
21
🔴 HACK ANDROID DEVICES WITH IP ADDRSS USING GHOST FRAMEWORK 🔴 ➖➖➖➖➖➖➖➖➖➖➖➖➖➖ ✳️ Ghost Framework is an Android post-exploitation framework that exploits the Android Debug Bridge to remotely access an Android device. Ghost Framework gives you the power and convenience of remote Android device administration. ✳️ We can use this framework to control old Android devices which have turn on the debug bridge in the "Developer options". ✳️ Now this becomes very harmful because an attacker gets the full admin control on the vulnerable Android device. But we need access to victims mobile and need to be in same network as attacker or use port forwarding. Ok lets start
61612Loading...
22
✅Windows 11 ,Windows Games, Android Games and Cracked softwares are uploaded here 👇 https://t.me/+iNEqAM7mVm1kNDM0 (‼️ JOIN NOW THIS LINK IS NOT PERMANENT ‼️)
1450Loading...
23
📊 Trending Channels List •••••• 🥳 - Free Netflix Accounts Here ⭐️ - Free Hacked Apps 😍 - Best Wallpaper Channel •••••• 📲 - Hacking Tools & Apps 😱 - Desktop Wallpapers 🛑 - Money+Hacking+DarkWeb 😱 - Mind Blowing Facts •••••• Ⓜ️ - Free Premium Courses 💵 - Premium Apps 🎈 - Only Minimalist Wallpapers 💟 - Spirituality | Mind | Soul •••••• 📲 - Paid Apps + Softwares 🧑‍💻 - Become a Hacker Today 🔆 - Phone Wallpapers 💡 - Deep Thoughts ••••••
2030Loading...
24
Media files
1 0650Loading...
25
🔵 Injection Attack ➖➖➖➖➖➖➖➖➖➖➖➖➖➖ ✳️ A code injection happens when an attacker sends invalid data to the web application with the intention to make it do something that the application was not designed/programmed to do. ✳️ In simple words, an injection attack is one in which databases and other systems are vulnerable to such an extent that an attacker can inject malicious or untrusted data into the system. This occurs when untrusted data is sent to an interpreter as part of a command or query. Basically, the attacker's data tricks the interpreter into executing commands without adequate authorization. ✳️ the most common example around this security vulnerability is the SQL query consuming untrusted data. You can see one of OWASP’s examples below: String query = “SELECT * FROM accounts WHERE custID = ‘” + request.getParameter(“id”) + “‘”; ✳️ This query can be exploited by calling up the web page executing it with the following URL: http://example.com/app/accountView?id=’ or ‘1’=’1 causing the return of all the rows stored on the database table. (I will explain more about this queries and working of sql injection later) ✳️ The core of a code injection vulnerability is the lack of validation and sanitization of the data used by the web application, which means that this vulnerability can be present on almost any type of technology. ✳️ Anything that accepts parameters as input can potentially be vulnerable to a code injection attack.
8883Loading...
26
🔴 some of the Types of Injections ➖➖➖➖➖➖➖➖➖➖➖➖➖➖ ✅ Depending on the type of database system, the programming language and other factors, there can be many different types of injections: 🔹 Code Injection 🔹 CRLF Injection 🔹 OS Command Injection 🔹 XSS 🔹 Email Header Injection 🔹 SQL Injection Etc..
7813Loading...
27
🔵 How do you prevent code injection vulnerabilities? ✅ Preventing code injection vulnerabilities really depends on the technology you are using on your website. For example, if you use WordPress, you could minimize code injection vulnerabilities by keeping it to a minimum of plugin and themes installed. 🔹 If you have a tailored web application and a dedicated team of developers, you need to make sure to have security requirements your developers can follow when designing and writing software. This will allow them to keep thinking about security during the lifecycle of the project. ⚠️ Here are OWASP’s technical recommendations to prevent SQL injections: 👉 Preventing SQL injections requires keeping data separate from commands and queries. 🔹The preferred option is to use a safe API, which avoids the use of the interpreter entirely or provides a parameterized interface or migrate to use Object Relational Mapping Tools (ORMs). Note: Even when parameterized, stored procedures can still introduce SQL injection if PL/SQL or T-SQL concatenates queries and data, or executes hostile data with EXECUTE IMMEDIATE or exec(). 🔹 Use positive or “whitelist” server-side input validation. This is not a complete defense as many applications require special characters, such as text areas or APIs for mobile applications. 🔹 For any residual dynamic queries, escape special characters using the specific escape syntax for that interpreter. Note: SQL structure such as table names, column names, and so on cannot be escaped, and thus user-supplied structure names are dangerous. This is a common issue in report-writing software. 🔹 Use LIMIT and other SQL controls within queries to prevent mass disclosure of records in case of SQL injection.
1 0472Loading...
28
📊 Trending Channels List •••••• 🥳 - Free Netflix Accounts Here ⭐️ - Free Hacked Apps 😍 - Best Wallpaper Channel •••••• 📲 - Hacking Tools & Apps 😱 - Desktop Wallpapers 🛑 - Money+Hacking+DarkWeb 😱 - Mind Blowing Facts •••••• Ⓜ️ - Free Premium Courses 💵 - Premium Apps 🎈 - Only Minimalist Wallpapers 💟 - Spirituality | Mind | Soul •••••• 📲 - Paid Apps + Softwares 🧑‍💻 - Become a Hacker Today 🔆 - Phone Wallpapers 💡 - Deep Thoughts ••••••
1921Loading...
29
Are you available ? 🤔
1470Loading...
30
Media files
1 2160Loading...
31
💠 Top 3 methods of Cracking Passwords Techniques Used By Hackers (intermediate) ➖➖➖➖➖➖➖➖➖➖➖➖➖ 🔹 Dictionary Attack 👉 A dictionary attack is a technique used by most regular hackers to determine the passphrase by trying their luck many times. Unlike its name, it works like a dictionary consisting of usual words that many people use as their password. On Dictionary attacks, hackers attempt to crack your passwords by making random guesses. 🔹 Brute Force Attack 👉 Well, Brute-Force is an advanced version of Dictionary attack. In this attack, the hacker submits many passwords or passphrases with the hope of eventually guessing correctly. The attacker’s role is to systematically check all possible passwords and passphrases until the correct one is found. 🔹 Rainbow Table Attack 👉 Well, Rainbow Table is usually a large dictionary that contains loads of pre-calculated hashes and the passwords from which they were calculated. The major difference between Rainbow and other dictionary attacks is the Rainbow table is specially optimized for hashes and passwords ✅ Thats it for intermediate hackers, I hope you got to know something about password cracking techniques Keep supporting us❤️,         ➖@hackersworldunited ➖
1 31810Loading...
👍 2
This was done on Windows 10 specifically
نمایش همه...
👍 2🔥 1
✳️ How to Prevent Users from Changing Proxy Settings on Windows ➖➖➖➖➖➖➖➖➖➖➖➖➖    💠 To disable proxy changing, we are going to use the Local Group Policy editor. The process might look complicated, but it’s super easy if you follow it step-by-step. 🔹Step 1: First of all, click on the Start button and search for ‘gpedit.msc’ 🔹Step 2: Now click on the Edit Group Policy from the list options. 🔹Step 3: On the Local Group Policy Editor, head to the following path: User Configuration > Administrative Templates > Windows Components > Internet Explorer 🔹Step 4: On the right pane, double click on the ‘Prevent Changing Proxy settings’ 🔹Step 5: In the new Window that opens, select the ‘Enabled’ option. Once done, click on the ‘Ok’ button to apply the changes.    ✅ That’s it! You are done. Now the option to change the proxy settings will no longer be available for users. Keep supporting us❤️,             ➖@hackersworldunited
نمایش همه...
👍 2🔥 1🥰 1
Are you available ? 🤔
نمایش همه...
👍 1
Yes 🥰
No ✖
👍 1🔥 1
✳️ NETWORKING BASICS: part-1 ✳️ ➖➖➖➖➖➖➖➖➖➖➖➖➖➖ 🔴 IP Addresses 💠 Internet Protocol address is the abbreviation of IP address. 💠 Each digital device (computer, laptop, phone, tablet, etc.) is assigned an IP address, and this is what enables us to communicate and connect with devices. Imagine an IP address as similar to your house address. Without that address, no one could find you or send you snail mail. 💠 The IP address system we are presently using is known as IP version 4, or IPv4.  It is made up of 32 bits of four octets, or four groups of 8 bits (on/off switches). 💠For instance, 192.168.1.101. Each of the numbers between the periods (.) is the decimal equivalent of 8 bits. This means that we calculate the base 2 number that computers use represented by the 8 bits and convert them to decimal numbers that humans are more accustomed to working with. Each one of the octets (8 bits) is capable of representing numbers within the range 0 through 255 (2 to the 8th power). ✳️ Classes of IP Addresses: 💠 IP addresses are generally put into three classes, and the ranges are: 🔹Class A: 0.0.0.0 - 127.255.255.255 🔹 Class B: 128.0.0.0 - 191.255.255.255 🔹 Class C: 192.0.0.0 - 223.255.255.255 💠 Later, we will address subnetting and subnet masks that vary with these different IP classes. ✳️ Public vs. Private IP Addresses 💠 It's important to note that our IP address system has its limitations. The biggest limitation is that there are not enough IP addresses to cover all of the devices that need to connect to the internet. The IPv4 system that we are working with now has only 4.3 billion IP addresses. With 7.3 billion people on the planet and far more devices, that certainly is not enough. 💠 As a result, a system was developed to reuse a group of IP addresses to be used within a LAN—and are not usable over the internet. These addresses can be used over and over again within each local area network, but not over the internet, thereby conserving the number of IP addresses necessary to keep the world going 'round. ✅ These private addresses include: 🔹192.168.0.0 - 192.168.255.255 🔹10.0.0.0 - 10.255.255.255 🔹172.16-.0.0 - 172.16.255.255 ✅ You have probably seen the private IP addresses beginning with 192.168.xxx.xxx or 10.xxx.xxx.xxx on your Kali system when you type ifconfig. 💠 This is your private IP that is only usable on the local area network. To communicate over the internet, it must be translated to a public IP by a NAT device (will see NAT in the next post.. stay tuned). ➖➖➖➖➖➖➖➖➖➖➖➖➖➖ Keep supporting us❤️ @hackersworldunited
نمایش همه...
👍 3🔥 2 1
✳️ How do you prevent broken authentication vulnerabilities? 💠 In order to avoid broken authentication vulnerabilities, make sure the developers apply to the best practices of website security. Support them by providing access to external security audits and enough time to properly test the code before deploying to production. 💠 OWASP’s technical recommendations are the following: 🔹 Where possible, implement multi-factor authentication to prevent automated, credential stuffing, brute force, and stolen credential reuse attacks. 🔹 Do not ship or deploy with any default credentials, particularly for admin users. 🔹 Implement weak-password checks, such as testing new or changed passwords against a list of the top 10,000 worst passwords. 🔹 Align password length, complexity and rotation policies with NIST 800-63 B’s guidelines in section 5.1.1 for Memorized Secrets or other modern, evidence-based password policies. 🔹 Ensure registration, credential recovery, and API pathways are hardened against account enumeration attacks by using the same messages for all outcomes. 🔹 Limit or increasingly delay failed login attempts. Log all failures and alert administrators when credential stuffing, brute force, or other attacks are detected. 🔹Use a server-side, secure, built-in session manager that generates a new random session ID with high entropy after login. Session IDs should not be in the URL. Ids should also be securely stored and invalidated after logout, idle, and absolute timeouts. Will continue the other vulns. shortly.. stay tuned ➖➖➖➖➖➖➖➖➖➖➖➖➖➖ Keep supporting us❤️ @hackersworldunited
نمایش همه...
🔥 2🥰 1
✳️ Types of Broken Authentication Vulnerabilities 💠 According to the OWASP Top 10, these vulnerabilities can come in many forms. A web application contains a broken authentication vulnerability if it: 🔹Permits automated attacks such as credential stuffing, where the attacker has a list of valid usernames and passwords. 🔹 Permits brute force or other automated attacks. 🔹 Permits default, weak, or well-known passwords, such as”Password1″ or “admin/admin.″ 🔹 Uses weak or ineffective credential recovery and forgot-password processes, such as “knowledge-based answers,” which cannot be made safe. 🔹 Uses plain text, encrypted, or weakly hashed passwords. 🔹 Has missing or ineffective multi-factor authentication. 🔹 Exposes session IDs in the URL (e.g., URL rewriting). 🔹 Does not rotate session IDs after successful login. 🔹 Does not properly invalidate session IDs. User sessions or authentication tokens (particularly single sign-on (SSO) tokens aren’t properly invalidated during logout or a period of inactivity. ✳️ Writing insecure software results in most of these vulnerabilities. They can be attributed to many factors, such as lack of experience from the developers. It can also be the consequence of more institutionalized failures such as lack of security requirements or organizations rushing software releases, in other words, choosing working software over secure software.
نمایش همه...
👍 1🔥 1
✳️ Broken Authentication ➖➖➖➖➖➖➖➖➖➖➖➖➖➖ 💠 A broken authentication vulnerability can allow an attacker to use manual and/or automatic methods to try to gain control over any account they want in a system – or even worse – to gain complete control over the system. 💠 Websites with broken authentication vulnerabilities are very common on the web. Broken authentication usually refers to logic issues that occur on the application authentication’s mechanism, like bad session management prone to username enumeration – when a malicious actor uses brute-force techniques to either guess or confirm valid users in a system. 💠To minimize broken authentication risks avoid leaving the login page for admins publicly accessible to all visitors of the website: 🔹/administrator on Joomla!, 🔹 /wp-admin/ on WordPress, 🔹 /index.php/admin on Magento, 🔹 /user/login on Drupal. 💠 The second most common form of this flaw is allowing users to brute force username/password combination against those pages.
نمایش همه...
👍 2