Authentication
Compromising the authentication process will lead to account takeover (ATO) vulnerabilities and depending on the accounts you takeover it could also lead to privilege escalation.
HTTP Basic Auth


Json Web Token (JWT)

Consists of three parts separated by dots:
Signature methods to sign a JWT token:
EX

None Algorithm

Brute Force Secret Key
To crack these keys:
RSA to HMAC


Security Assertion Markup Language (SAML)

Original SAML Response

XML Signature Removal
XMLComment Injection

Last updated