Once an authentication failure is detected, access needs to be blocked. It is also useful to log (associated with the user's identity if possible) and flag these as possibly malicious activity for further analysis, or as input for application intrusion detection systems.
NB: the key concept for this card is permitting access, even though authentication checks were undertaken and detected a failure. See AT 4 for the similar authorization failure.
Kate can bypass authentication because it does not fail secure (i.e. it defaults to allowing unauthenticated access)
Owasp ASVS (4.0): 4.1.5
Capec: 115
Owasp SCP: 28
Owasp Appsensor:
Safecode: 28
ASVS V4.1 - General Access Control Design
Password Guessing/Brute Force Attacks
Account Takeover (ATO) Attacks
Loading comments 0%