Authentication

Master exploiting authentication mechanisms through real-world scenarios, covering enumeration and brute force, session management, OAuth, MFA/2FA and JWT vulnerabilities. This module will focus on understanding and mitigating critical vulnerabilities in authentication systems. We will first learn enumeration and brute forcing authentication mechanisms, followed by exploring session management and various attacks that can be performed against insecure implementations. We will cover a range of topics, including JSON Web Tokens (JWT), OAuth vulnerabilities covering missing state parameters, token stealing and many more. Finally, we will explore the significance of MFA/2FA in adding layers of security and exploiting them. All the rooms are equipped with realistic scenarios to practically allow you to explore and address various vulnerabilities.

Next Steps
test-tube

Hacking Windows is often daunting. Grasp the fundamentals of core Windows concepts.

What are modules?

A learning pathway is made up of modules, and a module is made of bite-sized rooms (think of a room like a mini security lab).

module image

Admin Panel