4.4 Authentication Testing
Evidence:
You can use Burp's Cluster Bomb attack
Evidence:
CAPTCHA effectiveness
Assess CAPTCHA challenges and attempt automating solutions depending on difficulty.
Attempt to submit request without solving CAPTCHA via the normal UI mechanism(s).
Attempt to submit request with intentional CAPTCHA challenge failure.
Attempt to submit request without solving CAPTCHA (assuming some default values may be passed by client-side code, etc) while using a testing proxy (request submitted directly server-side).
Attempt to fuzz CAPTCHA data entry points (if present) with common injection payloads or special characters sequences.
Check if the solution to the CAPTCHA might be the alt-text of the image(s), filename(s), or a value in an associated hidden field.
Attempt to re-submit previously identified known good responses.
Check if clearing cookies causes the CAPTCHA to be bypassed (for example if the CAPTCHA is only shown after a number of failures).
If the CAPTCHA is part of a multi-step process, attempt to simply access or complete a step beyond the CAPTCHA (for example if CAPTCHA is the first step in a login process, try simply submitting the second step [username and password]).
Check for alternative methods that might not have CAPTCHA enforced, such as an API endpoint meant to facilitate mobile app access.
Evaluate the unlock mechanismâs resistance to unauthorized account unlocking.
Typical unlock mechanisms may involve secret questions or an emailed unlock link. The unlock link should be a unique one-time link, to stop an attacker from guessing or replaying the link and performing brute force attacks in batches Note that an unlock mechanism should only be used for unlocking accounts. It is not the same as a password recovery mechanism, yet could follow the same security practices.
Evidence:
Try to break the authentication process in order to obtain a valid session ID.
Manipulate the server's response
Exploit the "remember me" functionality
Try to bypass the authentication mechanisms in any section of the web pages which requires some sort of authentication with the following techinques:
Access the URL directly without any setted Cookie. You can use the Autorize Burp plugin with empty cookies.
Check if the URL or POST parameters are used to verify a successful log in. E.x.
http://www.site.com/page.asp?authenticated=no
.Check if session IDs generation are predictable. Use Burp Suite sequencer.
Tests if the authentication function works as intended and it is not bypasseable
Perform SQL or NoSQL injection attacks. âSQLi_Auth_Bypass-Master_List.txt & No SQLI Payloads
Evidence:
Validate that the generated session is managed securely and do not put the userâs credentials in danger.
Check if credentials are stored on the browser memory.
Evidence:
Review if the application stores sensitive information on the client-side.
Review if access can occur without authorization.
Entering sensitive information into the application and logging out. Then the tester clicks the Back button of the browser to check whether previously displayed sensitive information can be accessed whilst unauthenticated.
Check that the following directives are present:
Evidence:
Evaluate the length and complexity
Evaluate the existence of a password history.
Check if the user can request password recovery on demand without restrictions.
Evidence
Determine the complexity and how straight-forward the questions are.
Assess possible user answers and brute force capabilities.
Evidence:
if users, other than administrators, can change or reset passwords for accounts other than their own?
if users can manipulate or subvert the password change or reset process to change or reset the password of another user or administrator?
if the password change or reset process is vulnerable to CSRF?
Is the old password requested to complete the change?
Are reset passwords generated randomly?
Evidence:
Identify alternative authentication channels (SSO).
For each alternative channel where user accounts or functionality are shared, identify if all the authentication functions of the primary channel are available, and if anything extra exists.
Assess the security measures used and if any bypasses exists on the alternative channels.
Evidence:
Last updated