<?xml version="1.0"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="en">
		<id>https://wiki.owasp.org/index.php?action=history&amp;feed=atom&amp;title=OWASP_Delhi_Meeting_DeMystifying_Authentication_Attacks</id>
		<title>OWASP Delhi Meeting DeMystifying Authentication Attacks - Revision history</title>
		<link rel="self" type="application/atom+xml" href="https://wiki.owasp.org/index.php?action=history&amp;feed=atom&amp;title=OWASP_Delhi_Meeting_DeMystifying_Authentication_Attacks"/>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_Delhi_Meeting_DeMystifying_Authentication_Attacks&amp;action=history"/>
		<updated>2026-04-26T09:37:04Z</updated>
		<subtitle>Revision history for this page on the wiki</subtitle>
		<generator>MediaWiki 1.27.2</generator>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_Delhi_Meeting_DeMystifying_Authentication_Attacks&amp;diff=46675&amp;oldid=prev</id>
		<title>Dhruvsoi: New page: Authentication plays a vital role in the security of web applications. When a user provides his login name and password to validate and prove his identity, the application assigns the user...</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_Delhi_Meeting_DeMystifying_Authentication_Attacks&amp;diff=46675&amp;oldid=prev"/>
				<updated>2008-11-21T12:34:35Z</updated>
		
		<summary type="html">&lt;p&gt;New page: Authentication plays a vital role in the security of web applications. When a user provides his login name and password to validate and prove his identity, the application assigns the user...&lt;/p&gt;
&lt;p&gt;&lt;b&gt;New page&lt;/b&gt;&lt;/p&gt;&lt;div&gt;Authentication plays a vital role in the security of web applications. When a user provides his login name and password to validate and prove his identity, the application assigns the user explicit privileges to the system, based on the identity established by the supplied credentials.&lt;br /&gt;
&lt;br /&gt;
However, there can be many weaknesses in an application that might be exposing the information and resources at the server side. Vulnerabilities like clear-text transmission of passwords, replay attacks, poor 'Forgot password' implementation, poor 'Reset password' implementation, reversible encryption, Back-back-refresh trick, error handling, etc. can be serious threats to the application.&lt;br /&gt;
&lt;br /&gt;
By Gaining experience from auditing a number of diverse web applications, Gunwant Singh has learnt considerably in identifying the core cause of these flaws and has extensive experience in testing and help mitigating these attacks from the root.&lt;br /&gt;
&lt;br /&gt;
Gunwant Singh will share his knowledge on the workings and mitigation of these flaws. He will also discuss some interesting facts on CAPTCHA issues, information leakage etc.&lt;/div&gt;</summary>
		<author><name>Dhruvsoi</name></author>	</entry>

	</feed>