O'Reilly logo

How to Break Web Software: Functional and Security Testing of Web Applications and Web Services by Mike Andrews, James A. Whittaker

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

CHAPTER 8. Authentication

image

What’s In This Chapter?

This chapter discusses authentication, a topic that is of utmost importance in many Web applications that must validate machines, users, or accounts. There are many ways of implementing authentication and several ways of breaking it, and Web developers should be familiar with both. This chapter covers four techniques for breaking Web-based authentication that every Web project stakeholder should be aware of.

Introduction

We’ve made the point over and over in this book: The Web is different. The differences between Web applications and normal applications are many, but some specific differences ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required