Security Notes
search
Ctrlk
  • redhatWhoami
  • Pentestingchevron-right
    • WEP-Penchevron-right
      • Reconnaissance
      • Enumeration
      • OWSAP TOP 10chevron-right
        • A01 Broken Access Controlchevron-right
        • A02 Security Misconfigurationchevron-right
        • A03 Software Supply Chain Failureschevron-right
        • A04 Cryptographic Failureschevron-right
          • Weak Algorithms and Inadequate Hashing
          • PRNG Failures and Predictable Secrets
          • Cryptographic Failure
          • Weak Encoding for Password
          • Improper Following of a Certificate's Chain of Trustchevron-right
          • Clear Text Transmission Of Sensitive Datachevron-right
          • Cryptographic Key Management and Implementation
        • A05 Injectionchevron-right
        • A06 Insecure Designchevron-right
        • A07 Authentication Failureschevron-right
        • A08 Software or Data Integrity Failureschevron-right
        • A09 Security Logging and Alerting Failureschevron-right
        • A10 Mishandling of Exceptional Conditions
      • JWT Hacking
      • Checklistschevron-right
    • API-Penchevron-right
    • NET-Penchevron-right
gitbookPowered by GitBook
block-quoteOn this pagechevron-down
  1. Pentestingchevron-right
  2. WEP-Penchevron-right
  3. OWSAP TOP 10

A04 Cryptographic Failures

Weak Algorithms and Inadequate Hashingchevron-rightPRNG Failures and Predictable Secretschevron-rightCryptographic Failurechevron-rightWeak Encoding for Passwordchevron-rightImproper Following of a Certificate's Chain of Trustchevron-rightClear Text Transmission Of Sensitive Datachevron-rightCryptographic Key Management and Implementationchevron-right
PreviousVulnerable and Outdated Componentschevron-leftNextWeak Algorithms and Inadequate Hashingchevron-right

Last updated 1 day ago