10717-6 Authentication and Authorization
10717-6 Authentication and Authorization
1 Introduction
Knowledge factors
Ownership factors
Inherence factors
user has. user knows. user is.
E.g. Security E.g. password, E.g. fingerprint,
token, mobile PIN, secret signature, face,
phone, bank question retinal pattern
online token
Its response has a private answer but is easily guessable (i.e. social engineering)
• Example: What’s your mother’s name?
• Example: What was your first car?
Guessable Recyclable
password reset password reset
Predictable
link link
password reset
token
<?
session_start();
if (!isset($_SESSION['logged'])) {
header("Location: http://www.elsfoo.com/login");
die();
}
?>
…
// Protected Content
…
<?
session_start();
if (!isset($_SESSION['logged'])) {
header("Location: http://www.elsfoo.com/login");
die();
}
?>
…
// Protected Content
…
<?php
if (isset($_GET['lang'])) {
$my_file = $_GET['lang'] . '.html'; //Add extension to my_file
include('files/' . $ my_file ); //Display the file
}
Seclist SkullSecurity
bAdmin Phenoelit
CIRT CAPTCHA