Attacking Authentication Mechanisms

Modern applications use advanced authentication & authorization standards to manage access and improve user experience. Frameworks such as JWT, OAuth, and SAML centralize access and help enforce organizational policies.

  • Authentication confirms a user's identity (e.g., login with username/password)

  • Authorization determines what resources a user can access (e.g., RBAC, ABAC, DAC, MAC policies)

Common standards in focus of this module:

  • JWT — JSON Web Tokens, widely used for stateless authentication/session management

  • OAuth — Authorization framework for delegated access ("Login via Google/Facebook", API scopes etc.)

  • SAML — Extensible authentication & SSO protocol, commonly used in enterprises

Misconfigurations or poor practices in these mechanisms can lead to critical vulnerabilities — including privilege escalation, account takeover, and unauthorized data access.

This module teaches how these mechanisms work, how they're attacked, and how to avoid classic security pitfalls.

Last updated