Answers can be found at http://mdsec.net/wahh.
- While testing a web application, you log in using your credentials of joe and pass. During the login process, you see a request for the following URL appear in your intercepting proxy:
What three vulnerabilities can you diagnose without probing any further?
- How can self-registration functions introduce username enumeration vulnerabilities? How can these vulnerabilities be prevented?
- A login mechanism involves the following steps:
- (a) The application requests the user's username and passcode.
- (b) The application requests two randomly chosen letters from the user's memorable word.
Why is the required information requested in two separate steps? What defect would the mechanism contain if this were not the case?
- A multistage login mechanism first requests the user's username and then various other items across successive stages. If any supplied item is invalid, the user is immediately returned to the first stage.
What is wrong with this mechanism, and how can the vulnerability be corrected?
- An application incorporates an antiphishing mechanism into its login functionality. During registration, each user selects a specific image from a large bank of memorable images that the application presents to her. The login function involves the following steps:
- (a) The user enters her username and date of birth.
- (b) If these details are correct, the application shows ...