Module 05 — Authentication & Access Control¶
Icon: Lock | Colour: Yellow
Overview¶
Tests for broken authentication, session management weaknesses, insecure CORS configuration, IDOR, CSRF gaps, and admin path exposure.
How It Works¶
- Default credentials — tests 13 common username/password pairs (e.g.
admin/admin,admin/password) against discovered login forms. - Rate limiting — sends 20 rapid login attempts to check for brute-force protection.
- CORS origin testing — sends five different
Originheaders (arbitrary, null, subdomain, etc.) to detect misconfigured cross-origin policies. - IDOR testing — modifies resource IDs to adjacent values to detect insecure direct object references.
- CSRF token scanning — checks forms for the presence of anti-CSRF tokens.
- Admin path probing — tests 16 common admin paths (e.g.
/admin,/dashboard,/wp-admin) for unauthorised access.
Expected Findings¶
| Finding | Severity |
|---|---|
| Default credentials accepted | Critical |
| CORS allows arbitrary origin | High |
| IDOR detected | High |
| CORS wildcard with credentials | High |
| Missing CSRF protection | Medium |
| No rate limiting on login | Medium |
| CORS accepts null origin | Medium |
| HTTP method override possible | Medium |