In this video, we cover the theory behind authentication vulnerabilities, how to find these types of vulnerabilities, how to exploit them and how to prevent them.
▬ ✨ Support Me ✨ ▬▬▬▬▬▬▬▬▬▬
Buy my course: https://bit.ly/30LWAtE
▬ 📖 Contents of this video 📖 ▬▬▬▬▬▬▬▬▬▬
00:00 - Introduction
00:23 - Web Security Academy Course (https://bit.ly/30LWAtE)
01:33 - Agenda
02:10 – What are Authentication Vulnerabilities?
16:43 – How to Find and Exploit Authentication Flaws?
25:42 – How to Prevent Authentication Vulnerabilities?
30:01 – Resources
30:46 - Thank You
▬ 🔗 Links 🔗 ▬▬▬▬▬▬▬▬▬▬
Video slides: https://github.com/rkhal101/Web-Security-Academy-Series/blob/main/broken-authentication/theory/Authentication%20Vulnerabilities%20Complete%20Guide%20Theory%20Video%20Slides.pdf
Web Security Academy - Authentication: https://portswigger.net/web-security/authentication
Rana's Twitter account: https://twitter.com/rana__khalil