Top Banner
24
Welcome message from author
This document is posted to help you gain knowledge. Please leave a comment to let me know what you think about it! Share it to your friends and learn new things together.
Transcript
Page 1: Sar writingv2
Page 2: Sar writingv2
Page 3: Sar writingv2
Page 4: Sar writingv2
Page 5: Sar writingv2
Page 6: Sar writingv2
Page 7: Sar writingv2
Page 8: Sar writingv2
Page 9: Sar writingv2
Page 10: Sar writingv2
Page 11: Sar writingv2
Page 12: Sar writingv2
Page 13: Sar writingv2
Page 14: Sar writingv2
Page 15: Sar writingv2
Page 16: Sar writingv2
Page 17: Sar writingv2
Page 18: Sar writingv2
Page 19: Sar writingv2

Lack of Brute Force Protection on Change

Password Page

The change password function did not enforce

account lockout. After performing ten (10) invalid

login attempts, the application allowed the user

to login with valid credentials.

Without enforcing account lockout, it would be

possible for an attacker to launch ongoing

password guessing attacks against the web

application.

Framework Safeguard: AC-7

Moderate (CVSS=6.2). An attack requires

publicly available tools, authenticated

access to the application and a moderate

amount of time, depending on password

strength.

A successful brute force password exploit

could allow an attacker to guess the

password of a compromised account. This

would allow the attacker to return later,

using the known password, or could allow

the attacker to compromise the user’s other

accounts.

Configure the application to lock

accounts for 30 minutes after 10

consecutive invalid authentication

attempts.

National IT Security Password Policy

Page 20: Sar writingv2
Page 21: Sar writingv2
Page 22: Sar writingv2
Page 23: Sar writingv2
Page 24: Sar writingv2