A7:2021 | Authentication Bypasses (1) | Cycubix Docs

Authentication Bypasses

Authentication Bypasses happen in many ways but usually take advantage of some flaw in the configuration or logic. Tampering to achieve the right conditions.

Hidden inputs

The simplest form is a reliance on a hidden input in the web page/DOM.

Removing Parameters

Sometimes, if an attacker doesn’t know the correct value of a parameter, they may remove it from the submission altogether to see what happens.

Forced Browsing

If an area of a site is not appropriately protected by configuration, that area of the site may be accessed by guessing/brute-forcing.

Last updated