CHAPTER 8. Authentication

image

What’s In This Chapter?

This chapter discusses authentication, a topic that is of utmost importance in many Web applications that must validate machines, users, or accounts. There are many ways of implementing authentication and several ways of breaking it, and Web developers should be familiar with both. This chapter covers four techniques for breaking Web-based authentication that every Web project stakeholder should be aware of.

Introduction

We’ve made the point over and over in this book: The Web is different. The differences between Web applications and normal applications are many, but some specific differences ...

Get How to Break Web Software: Functional and Security Testing of Web Applications and Web Services now with O’Reilly online learning.

O’Reilly members experience live online training, plus books, videos, and digital content from 200+ publishers.