ycliper

Популярное

Музыка Кино и Анимация Автомобили Животные Спорт Путешествия Игры Юмор

Интересные видео

2025 Сериалы Трейлеры Новости Как сделать Видеоуроки Diy своими руками

Топ запросов

смотреть а4 schoolboy runaway турецкий сериал смотреть мультфильмы эдисон
Скачать

The Need for Speed: Exploiting Race Conditions in Web Applications - Harriet Schofield

Автор: BSides Belfast

Загружено: 2025-12-12

Просмотров: 5

Описание: After noticing trends of vulnerabilities appearing in recent web application penetration tests, this talk focuses on how to identify and exploit these vulnerabilities (using BurpSuite), also touching on the implications of these if they’re found to exist in clients’ systems, ending with how to remediate them.

Time based username enumeration is seemingly becoming increasingly common, as developers are attempting to make their code as efficient and streamlined as possible. Because of this, it means that when logging into an application, valid usernames with invalid passwords take longer to evaluate than invalid usernames, since if the username is invalid then no additional checks are required on the password. Therefore, attackers can generate a list of valid usernames for the application.

Now, this may only be a low-risk issue if the application enforces other mitigating controls, such as account lockouts after a certain number of failed login attempts, or strong password policies. Both of these limit the potential for an attacker to successfully carry out a password brute force attack against their identified valid users.

However, using race conditions, account lockout policies can be bypassed. This can be done by sending a large number of login attempts (each with a different password in order to attempt brute forcing) to the application in parallel. If the application contains a race condition vulnerability, it will treat the group of requests sent in parallel as a single login attempt. Therefore, you can send significantly more attempts than the lockout policy allows. If an insecure password policy is in use (it has been observed that a number of companies aren’t enforcing comprehensive phrase deny-listing), this compounds the likelihood that one of the passwords attempted will result in a successful login, especially if supplemented with OSINT research on targeted users.

This chaining of vulnerabilities has been seen across a large number of our clients recently, including government, healthcare and infrastructure. It is an attack that is fairly simple to conduct, and can be overlooked in penetration testing. However, it is important to evaluate the presence of this, because it could result in unauthorised access and facilitate a considerable number of follow on attacks once an attacker has gained credentials.

#bsidesbelfast25 #securitybsides #bsidesbelfast #bsides

Не удается загрузить Youtube-плеер. Проверьте блокировку Youtube в вашей сети.
Повторяем попытку...
The Need for Speed: Exploiting Race Conditions in Web Applications - Harriet Schofield

Поделиться в:

Доступные форматы для скачивания:

Скачать видео

  • Информация по загрузке:

Скачать аудио

Похожие видео

Build a Visual Network Mapper in 30 Minutes (Google Antigravity)

Build a Visual Network Mapper in 30 Minutes (Google Antigravity)

'Like at do ye'? Perfecting Threat Detection for Next-Gen SOC's!  - Aaron Wilkinson

'Like at do ye'? Perfecting Threat Detection for Next-Gen SOC's! - Aaron Wilkinson

History of Video Game Console Hacking - Matthew Reaney

History of Video Game Console Hacking - Matthew Reaney

Lessons (not) learned from the Kyivstar Wiper Attack - Ben Aveling

Lessons (not) learned from the Kyivstar Wiper Attack - Ben Aveling

Application Security in the Age of Vibe Coding  - Ciaran Conliffe

Application Security in the Age of Vibe Coding - Ciaran Conliffe

Nowa Strategia Bezpieczeństwa USA. Co naprawdę planuje Trump | Salonik polityczny Ziemkiewicza

Nowa Strategia Bezpieczeństwa USA. Co naprawdę planuje Trump | Salonik polityczny Ziemkiewicza

When Pressure Hits, We All Lead – Building a Crisis-Ready Culture - Valerie Wilson

When Pressure Hits, We All Lead – Building a Crisis-Ready Culture - Valerie Wilson

The Halcyon project: applying real world DevSevOps to a vulnerable app -     James Clapperton

The Halcyon project: applying real world DevSevOps to a vulnerable app - James Clapperton

'Godfather of AI' warns of existential risks | GZERO World with Ian Bremmer

'Godfather of AI' warns of existential risks | GZERO World with Ian Bremmer

Strategia USA obnaża prawdę: wraca świat państw narodowych | Salonik Polityczny Ziemkiewicza

Strategia USA obnaża prawdę: wraca świat państw narodowych | Salonik Polityczny Ziemkiewicza

Getting the CPU5 Centurion onto the Network!

Getting the CPU5 Centurion onto the Network!

Sadzisz raz, zbierasz całe życie. Towar znika szybciej, niż zdąży się go wykopać

Sadzisz raz, zbierasz całe życie. Towar znika szybciej, niż zdąży się go wykopać

Black Channel Communications - Securing the Unsecure  -  Tim Harrison    Peter McCorry

Black Channel Communications - Securing the Unsecure - Tim Harrison Peter McCorry

Бизнесу НЕ ВЫЖИТЬ в России! 5 причин почему вам не нужно открывать свой бизнес / Борис Зарьков

Бизнесу НЕ ВЫЖИТЬ в России! 5 причин почему вам не нужно открывать свой бизнес / Борис Зарьков

Living Under the Land on Linux - Stuart McMurray

Living Under the Land on Linux - Stuart McMurray

Show Me The Honey: Creating Elasticsearch Honeypots Powered By LLMs - Claire Dickson (Burn)

Show Me The Honey: Creating Elasticsearch Honeypots Powered By LLMs - Claire Dickson (Burn)

Как стать невидимым в сети в 2026 году

Как стать невидимым в сети в 2026 году

The Digital Deception: Unveiling the Risks of 'Kid-Safe' Phones - Katie Colgan

The Digital Deception: Unveiling the Risks of 'Kid-Safe' Phones - Katie Colgan

Gorillas in Our Midst: The Runtime Secrets of Evasive IoT Malware - Carl Fitzpatrick

Gorillas in Our Midst: The Runtime Secrets of Evasive IoT Malware - Carl Fitzpatrick

Cyber Burnout: 30 Seconds From Death - Eleanor Dallaway

Cyber Burnout: 30 Seconds From Death - Eleanor Dallaway

© 2025 ycliper. Все права защищены.



  • Контакты
  • О нас
  • Политика конфиденциальности



Контакты для правообладателей: [email protected]