This site is the archived OWASP Foundation Wiki and is no longer accepting Account Requests.
To view the new OWASP Foundation website, please visit https://owasp.org

Difference between revisions of "Testing for Weak or unenforced username policy (OTG-IDENT-005)"

From OWASP
Jump to: navigation, search
(Final edit)
 
(2 intermediate revisions by 2 users not shown)
Line 1: Line 1:
 +
{{Template:OWASP Testing Guide v4}}
 +
 
== Summary ==
 
== Summary ==
  
 
User account names are often highly structured (e.g. Joe Bloggs account name is jbloggs and Fred Nurks account name is fnurks) and valid account names can easily be guessed.  
 
User account names are often highly structured (e.g. Joe Bloggs account name is jbloggs and Fred Nurks account name is fnurks) and valid account names can easily be guessed.  
 +
  
 
== Test objectives ==
 
== Test objectives ==
  
Determine whether consistent account name structure renders the application vulnerable to account enumeration
+
Determine whether a consistent account name structure renders the application vulnerable to account enumeration. Determine whether the application's error messages permit account enumeration.
  
Determine whether application's error messages permit account enumeration
 
  
 
== How to test ==
 
== How to test ==
  
Determine the structure of account names
+
* Determine the structure of account names.
 
 
Evaluate the application's response to valid and invalid account names
 
 
 
Use different responses to valid and invalid account names to enumerate valid account names
 
 
 
Use account name dictionaries to enumerate valid account names
 
 
 
=== Example ===
 
 
 
<insert some images of account enumeration>
 
  
== Tools ==
+
* Evaluate the application's response to valid and invalid account names.
  
 +
* Use different responses to valid and invalid account names to enumerate valid account names.
  
== References ==
+
* Use account name dictionaries to enumerate valid account names.
  
  
 
== Remediation ==
 
== Remediation ==
  
Ensure the application returns consistent generic error messages in response to invalid account name, password or other user credentials entered during the login process.
+
Ensure the application returns consistent generic error messages in response to invalid account name, password or other user credentials entered during the log in process.

Latest revision as of 14:58, 14 May 2014

This article is part of the new OWASP Testing Guide v4.
Back to the OWASP Testing Guide v4 ToC: https://www.owasp.org/index.php/OWASP_Testing_Guide_v4_Table_of_Contents Back to the OWASP Testing Guide Project: https://www.owasp.org/index.php/OWASP_Testing_Project

Summary

User account names are often highly structured (e.g. Joe Bloggs account name is jbloggs and Fred Nurks account name is fnurks) and valid account names can easily be guessed.


Test objectives

Determine whether a consistent account name structure renders the application vulnerable to account enumeration. Determine whether the application's error messages permit account enumeration.


How to test

  • Determine the structure of account names.
  • Evaluate the application's response to valid and invalid account names.
  • Use different responses to valid and invalid account names to enumerate valid account names.
  • Use account name dictionaries to enumerate valid account names.


Remediation

Ensure the application returns consistent generic error messages in response to invalid account name, password or other user credentials entered during the log in process.