ðŸĪŠ Authentication Attacks

⛔ïļ Access Controls

DAC I am the leader! I’m the one that says when we go. A user, who’s the owner of the file or another object defines who can and who cannot view it.

🔐 Apple Authentication

Authentication Mechanisms

This article is all about different authentication/authorisation mechanisms such as Basic Auth, SSO, tokens etc.

🔐 Windows Authentication

Each process in the system has an access token. This token determies what privileges this fellow has.

AWS Authentication

This article is about AWS authentication process and how this activity is logged within the system.

Linux Authentication

User Account/Data â€Ē /home/%username%/* â€Ē /etc/passwd â€Ē /etc/shadow â€Ē /etc/sudoers â€Ē /etc/group Unused accounts Look for unexpected account, especially those that don’t have password (empty).