logo

Authenticated and Unauthenticated Attacks on Websites

   

Added on  2022-08-12

4 Pages591 Words483 Views
 | 
 | 
 | 
Running head: ETHICAL HACKING AND PENETRATION TESTING
ETHICAL HACKING AND PENETRATION TESTING
Name of the Student
Name of the University
Author Note
Authenticated and Unauthenticated Attacks on Websites_1

1ETHICAL HACKING AND PENETRATION TESTING
Discussions
The comparison between the authenticated and unauthenticated attacks is as follows:
Authenticated attacks: The authenticated attacks target the procedure of authentication of a
website. This attack utilizes the site that an individual utilised in order to verify the identity
while accessing a service or an application (Gope, Lee & Quek, 2016). Someone who is
trusted carries out an authenticated attack. The attacker gets the admittance to the login
details of a person, log into the system and then executes the attack. The people executing the
authenticated attacks use the password and the username of an individual in order to prove
their identity.
Unauthenticated attacks: The unauthenticated attacks are the procedures of exploring the
weaknesses of a system of network without the requirement to log in as a user who is
authorized (Reed, 2016). The attackers who are malicious and want to gain admittance to the
crucial information of perform it without providing the authenticated details of login. The
unauthenticated attacks are in the contact forms and the carts of shopping. Most of the E-
commerce sites permit the user to fill the cart of shopping before they are given with the
details of login.
The two examples of authentication attacks are as follows:
Brute force: it permits an attacker to guess the password, username, credit card number or
the key of cryptography by utilising an automated procedure of trial and error (Stiawan et
al.,2019).
Insufficient authentication: It permit an attacker to gain admittance to a website that consist
of sensitive contents or sensitive functions without having to appropriately authenticate with
the website
Authenticated and Unauthenticated Attacks on Websites_2

End of preview

Want to access all the pages? Upload your documents or become a member.