2017 OWASP Top 10: Broken Authentication

  Рет қаралды 132,656

F5 DevCentral

F5 DevCentral

6 жыл бұрын

New 2021 OWASP Lightboard Series:
• 2021 OWASP Top Ten
Video 2/10 on the 2017 OWASP Top Ten Security Risks.
John Wagnon discusses the details of the #2 vulnerability listed in this year's OWASP Top 10 Security Risks: Broken Authentication. Learn about this security risk and how to guard against it.
community.f5.com/articles/lig...

Пікірлер: 40
@Wayne_Robinson
@Wayne_Robinson 4 жыл бұрын
Having a shirt with a mirrored logo so it looks correct after processing the video is great attention to detail! As a side benefit, it might be entertaining to see how many people notice when wearing the shirt in public.
@TheSnehaShetti
@TheSnehaShetti 3 жыл бұрын
I noticed that too , to be honest. I like it
@TheTechZLife
@TheTechZLife 3 жыл бұрын
just for that detail alone this dude gained my sub
@Sam-rp4hy
@Sam-rp4hy 3 жыл бұрын
So, credential stuffing is like a dictionary attack and automated attack is more of a brute force.
@charanpreet2211
@charanpreet2211 3 жыл бұрын
I think credential Stuffing is like brute force using rainbow tables (hashes stolen from previous breaches) and automated attack is like password cracking or password guessing attack /dictionary attack
@anselmleo4146
@anselmleo4146 3 жыл бұрын
Thanks for the amazing breakdown @F5 DevCentral. I was wondering where token authentications like jwt and passport come into play?
@ELEchico
@ELEchico 2 жыл бұрын
Thank you for the quick and straightforward explanations :)
@devcentral
@devcentral 2 жыл бұрын
Glad you enjoyed it!
@thifranzini
@thifranzini 5 жыл бұрын
Congrats for this video! It helped me a lot!
@devcentral
@devcentral 5 жыл бұрын
i'm glad you enjoyed it!
@chethangopalakrishna4264
@chethangopalakrishna4264 5 жыл бұрын
Useful information. Thank you.
@ricardoblikman2676
@ricardoblikman2676 2 жыл бұрын
This is a hard one, it is extremely difficult to stop multiple username password attack on microservices in parallel from multiple addresses.
@zer0day463
@zer0day463 2 жыл бұрын
Great Explanation
@devcentral
@devcentral 2 жыл бұрын
Glad you enjoyed it!
@marianocalzada6472
@marianocalzada6472 2 жыл бұрын
amazing video!
@devcentral
@devcentral 2 жыл бұрын
Glad you enjoyed it!
@pankajgawai6944
@pankajgawai6944 5 ай бұрын
great sir
@staynjohnson4221
@staynjohnson4221 4 жыл бұрын
8:41 if initial sessionID is thrown away and the server creates a brand new session id(that is not sent to the browser i suppose?) to interact with the client, how would the server now verify the client ?
@AyushSharma-bn2js
@AyushSharma-bn2js 4 жыл бұрын
I have the same doubt !! I guess the session id is shared with Browser or else it would not make sense 😅
@pragyapranshu4976
@pragyapranshu4976 3 жыл бұрын
I believe once a session has been closed, you need to wait for some time and reenter credentials again. Best example - Logging on to banking websites
@tiyasghoshroy9577
@tiyasghoshroy9577 2 жыл бұрын
A random session id is generated by the server (preferably one which is complex and random enough so that it is impossible to generate a valid one by luck) and sent to the browser. This random session id should only be valid for a certain duration and definitely be invalidated on logout and idleness. For further reference: codeahoy.com/2016/04/13/generating-session-ids/
@fahimuel
@fahimuel 6 жыл бұрын
Would have been better, if John would suggest how F5 Web Application Firewall or any other F5 products protects from broken authentication problem or any other OWASP top 10 issues.
@devcentral
@devcentral 6 жыл бұрын
thanks for the comment, fahimuel! We will be releasing videos very soon that show exactly what you mentioned...how the F5 ASM can guard against these attacks. Stay tuned!
@joshwaphilip9840
@joshwaphilip9840 5 жыл бұрын
Web application firewall is one of secondary preventing method. but basically industry using some of primary methods. it's like Password complexity, length, username/password enumeration and protect from brute force login
@davisli
@davisli 5 жыл бұрын
@@devcentral if failed login locks is one of the possible protection mechanism then i suppose an attacker who wants to deny users from accessing their services would succeed. Is there a way F5 WAF can prevent distributed brute Force login attacks without locking legitimate users out? Maybe by geolocation or the usual device IDs of a legitimate user?
@devcentral
@devcentral 5 жыл бұрын
@@davisli great question! The Advanced WAF has functionality that protects against this type of behavior by using device ID fingerprinting and IP reputation along with other features like Datasafe. Here are a couple of videos that might help... Datasafe: kzfaq.info/get/bejne/sN-jZN1i1cuom6s.html Credential Protection: kzfaq.info/get/bejne/j5aWg9OUlb-sl2Q.html F5 Advanced WAF: kzfaq.info/get/bejne/fqiSd65zu5q1h2Q.html Hope this helps!
@zserfv1001
@zserfv1001 3 жыл бұрын
Very helpful for me
@devcentral
@devcentral 3 жыл бұрын
glad you enjoyed it!
@yogeshwarans7781
@yogeshwarans7781 2 жыл бұрын
sir what purpose using session id
@domaincontroller
@domaincontroller 3 жыл бұрын
05:31 best practices
@Felix-og7pd
@Felix-og7pd Жыл бұрын
how to solve? credential stuffing automated attacks top 10000 passwords how to break? multifactor auth password check (that not top 10000) password complexity firewall
@Eric-nm7ff
@Eric-nm7ff 3 жыл бұрын
Stopped watching at "password complexity" being suggested as a solution to any problem.
@thewatcherlollol
@thewatcherlollol 3 жыл бұрын
ok buddy
@DrThrax009
@DrThrax009 3 жыл бұрын
But why? This is one of the basic and cost effective controls. Dont you think?
@dmaiyo5927
@dmaiyo5927 Жыл бұрын
How are you writing in reverse?
@devcentral
@devcentral Жыл бұрын
Thanks for the comment and a common question we get! This is how: kzfaq.info/get/bejne/i511kq9l3Km0hJc.html
2017 OWASP Top 10: XML External Entities
10:18
F5 DevCentral
Рет қаралды 97 М.
2017 OWASP Top 10: Injection Attacks
8:23
F5 DevCentral
Рет қаралды 217 М.
La final estuvo difícil
00:34
Juan De Dios Pantoja
Рет қаралды 27 МЛН
КАРМАНЧИК 2 СЕЗОН 6 СЕРИЯ
21:57
Inter Production
Рет қаралды 347 М.
2021 OWASP Top Ten: Cryptographic Failures
9:16
F5 DevCentral
Рет қаралды 34 М.
Explained: The OWASP Top 10 for Large Language Model Applications
14:22
2017 OWASP Top 10:  Cross-Site Scripting (XSS)
11:27
F5 DevCentral
Рет қаралды 144 М.
Identity and Access Management: Technical Overview
17:53
VMware End-User Computing
Рет қаралды 360 М.
Cross-Site Request Forgery (CSRF) | Complete Guide
48:11
Rana Khalil
Рет қаралды 83 М.
OWASP Top 10 in 10 Min! (Kinda)
18:44
NahamSec
Рет қаралды 25 М.
2017 OWASP Top Ten: Insufficient Logging and Monitoring
14:04
F5 DevCentral
Рет қаралды 56 М.
Difference between cookies, session and tokens
11:53
Valentin Despa
Рет қаралды 570 М.
OWASP TOP 10 Broken Authentication  - Explained with examples
21:37
Security in mind
Рет қаралды 3,6 М.
Broken Access Control | Complete Guide
39:33
Rana Khalil
Рет қаралды 40 М.
Which Phone Unlock Code Will You Choose? 🤔️
0:14
Game9bit
Рет қаралды 12 МЛН
🤔Почему Samsung ПОМОГАЕТ Apple?
0:48
Technodeus
Рет қаралды 456 М.
Carregando telefone com carregador cortado
1:01
Andcarli
Рет қаралды 1,9 МЛН
Как я сделал домашний кинотеатр
0:41
RICARDO
Рет қаралды 1,5 МЛН