THM Walkthrough: OWASP Top 10 #2: Broken Authentication

Just like the second entry into the OWASP Top 10 vulnerabilities for broken authentication, the walkthrough for this one is also going to be short and sweet. Recall from the overview article, broken authentication is really just that: the mechanisms used to authenticate a user and allow them into the site are broken. This allows … Continue reading THM Walkthrough: OWASP Top 10 #2: Broken Authentication

THM: OWASP Top 10 Severity 1/Injection Walkthrough

Continuing with our OWASP series we start here with the TryHackMe OWASP Top 10 Severity 1 Injection task. If you haven't yet, check out the Injection overview written up for HTH. In this example, the sample site set up by THM is vulnerable to some sort of injection attack. When we open the site up, … Continue reading THM: OWASP Top 10 Severity 1/Injection Walkthrough