Summary


Recap

  • The "basic" authentication scheme, the simplest method of authentication and one of the most commonly used authentication method sends authentication details in clear.

  • Digest authentication, never sent across the network user's credentials in the clear, but transmits as an MD5 digest of the user 's credentials.

  • NTLM, a Microsoft-proprietary protocol authenticates users and computers based on an authentication challenge and response.

  • Certificated authentication which uses public key cryptography and digital certificate to authenticate is stronger than other authentication mechanisms.

  • Forms based Authentication is a system in which unauthenticated requests are redirected to a web form where the unauthenticated users are required to provide their credentials.

  • Attackers make use of different tools to get better of the authentication protocols.

  • It is therefore necessary to evaluate and implement the most secure option while designing web applications to counter cracking activities.




Staf of EC-Council - Ethical Hacking Student Courseware. Certidied Ethical Hacker-Exam 312-50 (EC-Council E-Business Certification Series)
Staf of EC-Council - Ethical Hacking Student Courseware. Certidied Ethical Hacker-Exam 312-50 (EC-Council E-Business Certification Series)
ISBN: N/A
EAN: N/A
Year: 2003
Pages: 109

flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net