Authentication (Portswigger Academy)
How do Vulnerabilities arise?
What is the impact?
Vulnerabilities in different authentication mechanisms
Vulnerabilities in password-based loginVulnerabilities in multi-factor authenticationVulnerabilities in other authentication mechanismsLast updated