Search icon CANCEL
Subscription
0
Cart icon
Your Cart (0 item)
Close icon
You have no products in your basket yet
Arrow left icon
Explore Products
Best Sellers
New Releases
Books
Videos
Audiobooks
Learning Hub
Conferences
Free Learning
Arrow right icon
Arrow up icon
GO TO TOP
Mastering C# and .NET Framework

You're reading from   Mastering C# and .NET Framework .NET Under the hood

Arrow left icon
Product type Paperback
Published in Dec 2016
Publisher Packt
ISBN-13 9781785884375
Length 560 pages
Edition 1st Edition
Languages
Tools
Arrow right icon
Author (1):
Arrow left icon
Marino Posadas Marino Posadas
Author Profile Icon Marino Posadas
Marino Posadas
Arrow right icon
View More author details
Toc

Table of Contents (15) Chapters Close

Preface 1. Inside the CLR 2. Core Concepts of C# and .NET FREE CHAPTER 3. Advanced Concepts of C# and .NET 4. Comparing Approaches for Programming 5. Reflection and Dynamic Programming 6. SQL Database Programming 7. NoSQL Database Programming 8. Open Source Programming 9. Architecture 10. Design Patterns 11. Security 12. Performance 13. Advanced Topics Index

A2 – Broken Authentication and Session Management


The problem here is related to identity and permissions. As the official definition states:

"Application functions related to authentication and session management are often not implemented correctly, allowing attackers to compromise passwords, keys, or session tokens, or to exploit other implementation flaws to assume other users' identities."

This is even worse when the false authenticated users are remote (the typical case) and therefore difficult to track.

The problems here are multiple:

  • We might accept unwanted users (information and operation disclosure)

    • A variant of this is when an unwanted user gets administrator privileges, thus putting the whole system at risk

  • We might accept a user with credentials beyond the legitimate use of information for these credentials

Generally speaking, we can say this is a problem of impersonation or elevation of privileges (either because the attacker has no privilege at all or because it raises itself to...

lock icon The rest of the chapter is locked
Register for a free Packt account to unlock a world of extra content!
A free Packt account unlocks extra newsletters, articles, discounted offers, and much more. Start advancing your knowledge today.
Unlock this book and the full library FREE for 7 days
Get unlimited access to 7000+ expert-authored eBooks and videos courses covering every tech area you can think of
Renews at $19.99/month. Cancel anytime
Banner background image