Brute Force Login
Severity: High
Test name: Brute Force Login
Test ID: brute_force_login
Test name: Brute Force Login
Test ID: brute_force_login
Summary |
---|
A brute-force attack is an attempt of an attacker to discover a password by systematically trying every possible combination of letters, numbers, and symbols until revealing the correct combination. An attacker can always discover a password through the brute-force attack, but the downside is that it could take years to find it (depending on the password length and complexity, there could be trillions of possible combinations).
Impact |
---|
This vulnerability allows an attacker to get access to the privileged information.
Location |
---|
The issue can be found in the source code on the server side.
Remedy suggestions |
---|
- Review the existing Password Policy and, if necessary, increase the credentials complexity (length, lower/upper case, special symbols) to make brute-forcing a more time-consuming operation. A "strong" password policy makes it difficult or even impossible for one to guess the password through either manual or automated means.
- Review the existing Password Policy and, if necessary, increase the credentials complexity (length, lower/upper case, special symbols) to make brute-forcing a more time-consuming operation. A "strong" password policy makes it difficult or even impossible for one to guess the password through either manual or automated means.
- Multi-factor authentication (MFA) is by far the best defence against the majority of password-related attacks, including the brute-force attacks. It should be implemented wherever possible; however, depending on the audience of the application, it may not be practical or feasible to enforce the use of MFA.
- CAPTCHA can help prevent automated login attempts against accounts. However, many CAPTCHA implementations have weaknesses that can be solved using automated techniques or outsourced services. The use of CAPTCHA should be considered as a defence-in-depth control to make the brute-force attacks more time-consuming and expensive, rather than as a preventative.
Classifications |
---|
- CWE-307
- CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N
References |
---|
Updated 2 months ago