Introduction To OWASP Top Ten: A2 - Broken Authentication - Scored
Cyberscore

Did you know Cybrary has FREE video training? Join more than 2,500,000 IT and cyber security professionals, students, career changers, and more, growing their careers on Cybrary.

Time
25 minutes
Difficulty
Intermediate

This module for the Introduction to OWASP Top Ten Module covers A2: Broken Authentication.

Did you know Cybrary has FREE video training? Join more than 2,500,000 IT and cyber security professionals, students, career changers, and more, growing their careers on Cybrary.

Overview

CybrScore’s Introduction to OWASP Top Ten: A2 Broken Authentication lab is a premium Lab built for the intermediate skill level students to have hands-on practice with broken authentication vulnerabilities. Broken authentication vulnerabilities are second on the list of the top ten most common web application security risks reported in the OWASP Top 10 2017 report.

CybrScore’s Introduction to OWASP Top Ten: A2 Broken Authentication lab teaches students to Identify a simple case of Broken Authentication in a web application, how to Exploit a simple case of Broken Authentication by manipulating data stored in a browser’s cookie, and how to escalate privileges from a standard user account to a root or administrator account in a web service or application

Upon successful completion of the CybrScore Introduction to OWASP Top Ten: A2 Broken Authentication lab, students will be able to identify a simple case of Broken Authentication in a web application, and Exploit a simple case of Broken Authentication by manipulating cookie data and identify and escalate privilege from a standard user account to a root or administrator account in a web service or application.

CybrScore’s Introduction to OWASP Top Ten: A2 Broken Authentication lab takes approximately 1 hour to 2 hours to complete for most students.

In CybrScore’s Introduction to OWASP Top Ten: A2 Broken Authentication lab, students will assess for a broken authentication vulnerability. This is a key part of the Vulnerability Assessment Analyst work role and builds the ability to identify and exploit simple examples of broken authentication in a web application.

In CybrScore’s Introduction to OWASP Top Ten: A2 Broken Authentication lab, students will learn to Exploit a simple case of Broken Authentication by manipulating cookie data in a browser. This is a key part of the Vulnerability Assessment Analyst work role and builds the ability to bypass the authentication process of a Web application.

Click the enroll button to start the lab.