6 under-the-radar resources to master authentication vulnerabilities:
1. OWASP Auth Cheat Sheet
2. SANS ISC
3. NIST Special Publication 800-63B
4. CERT Vulnerability Note Database
5. IETF RFCs on Authentication Protocols
6. OAuth 2.0 Security Best Practices
(thread)
1. OWASP Auth Cheat Sheet
2. SANS ISC
3. NIST Special Publication 800-63B
4. CERT Vulnerability Note Database
5. IETF RFCs on Authentication Protocols
6. OAuth 2.0 Security Best Practices
(thread)
2. SANS Institute Security Resources. I suggest looking at the SANS Internet Storm Center (ISC) @SANSInstitute and search for "authentication"
Go here: sans.org and look in the "Free Cybersecurity Resources" section
Go here: sans.org and look in the "Free Cybersecurity Resources" section
5. IETF RFCs on Authentication Protocols. @ietf
Go here: datatracker.ietf.org and search for "authentication".
I suggest starting with the basics: datatracker.ietf.org
Go here: datatracker.ietf.org and search for "authentication".
I suggest starting with the basics: datatracker.ietf.org
7. More good stuff to come, so stay tuned, retweet this, and follow me @CristiVlad25
#pentesting #infosec #cybersecurity #appsec #ethicalhacking
#pentesting #infosec #cybersecurity #appsec #ethicalhacking
Loading suggestions...