OWASP Top 10 is an awareness document, which outlines the most critical security risks to web applications. Pentesting is performed according to the OWASP TOP 10 standard to reduce/mitigate the security risks.
In the exercise, we will focus on OWASP A2 Broken Authentication flaws and we will take a look at how to leverage the broken authentication vulnerability on a single page web application.
Objective: Leverage the broken authentication vulnerability and access the administrative portal.
The following credentials might be needed:
| Username | Password | | james@secbank.com | password1 |
Instructions:
The solution for this lab can be found in the following manual: https://assets.ine.com/labs/ad-manuals/walkthrough-2009.pdf