OWASP Top 10 is an awareness document, which outlines the most critical security risks to web applications. Pentesting is performed according to the OWASP TOP 10 standard to reduce/mitigate the security risks.

In the exercise, we will focus on OWASP A2 Broken Authentication flaws and we will take a look at how to leverage the broken authentication vulnerability on a single page web application.

Objective: Leverage the broken authentication vulnerability and access the administrative portal.

The following credentials might be needed:

| Username | Password | | james@secbank.com | password1 |

Instructions: 

The solution for this lab can be found in the following manual: https://assets.ine.com/labs/ad-manuals/walkthrough-2009.pdf