Chapter 6
■
Attacking Authentication
165
70779c06.qxd:WileyRed 9/14/07 3:13 PM Page 165
N OT E
The subtleties of devising a secure authentication mechanism run
deep here. If care is not taken in the asking of a randomly varying question,
then this can lead to new opportunities for username enumeration. For
example, in order to prevent an attacker from choosing his own question, an
application may store within each user’s profile the last question that user was
asked, and continue presenting that question until the user answers it correctly.
An attacker who initiates several logins using any given user’s username will
be met with the same question. However, if the attacker carries out the same
Do'stlaringiz bilan baham: |