Authentication vulnerabilities

Portswigger Academy Authentication Labs

The majority of threats related to the authentication process are associated with passwords and password-based authentication methods. Broken authentication also causes a significant amount of vulnerabilities.

As well as potentially allowing attackers direct access to sensitive data and functionality, they also expose additional attack surface for further exploits.

These are declining due to MFA, but are still critical and persist due to weak default credentials in IoT devices, password recovery flaws where resets are sent to unverified emails/phones, and brute-forceable logins with a lack of rate-limiting.


Last update: 2025-05-12 14:16