February 2006
Intermediate to advanced
240 pages
5h 47m
English

This chapter discusses authentication, a topic that is of utmost importance in many Web applications that must validate machines, users, or accounts. There are many ways of implementing authentication and several ways of breaking it, and Web developers should be familiar with both. This chapter covers four techniques for breaking Web-based authentication that every Web project stakeholder should be aware of.
We’ve made the point over and over in this book: The Web is different. The differences between Web applications and normal applications are many, but some specific differences ...