Calvin, a grey-hat hacker, targets a web application that has design flaws in its authentication mechanism. He enumerates usernames from the login form of the web application, which requests users to feed data and specifies the incorrect field in case of invalid credentials. Later, Calvin uses this information to perform social engineering.
Which of the following design flaws in the authentication mechanism is exploited by Calvin?
lawbut2
Highly Voted 3 years, 7 months agosunce12
Most Recent 1 year agovictorfs
2 years, 1 month agonuomi
2 years, 3 months agojosevirtual
2 years, 5 months agoDaniel8660
2 years, 8 months agosergiet
2 years, 9 months agoMMtc
2 years, 11 months agopyw
3 years agogiorgipirveli
3 years, 1 month agomileke2
3 years, 1 month agoegz21
3 years, 5 months agoegz21
3 years, 5 months agoChaoticda
3 years, 6 months agoUnitel21
3 years, 7 months agoblacksheep6r
3 years, 8 months agoLoneStarChief
3 years, 8 months ago