Calvin, a grey-hat hacker, targets a web application that has design flaws in its authentication mechanism. He enumerates usernames from the login form of the web application, which requests users to feed data and specifies the incorrect field in case of invalid credentials. Later, Calvin uses this information to perform social engineering.
Which of the following design flaws in the authentication mechanism is exploited by Calvin?
lawbut2
Highly Voted 3 years agosunce12
Most Recent 5 months, 1 week agovictorfs
1 year, 6 months agonuomi
1 year, 8 months agojosevirtual
1 year, 10 months agoDaniel8660
2 years, 1 month agosergiet
2 years, 1 month agoMMtc
2 years, 4 months agopyw
2 years, 5 months agogiorgipirveli
2 years, 6 months agomileke2
2 years, 6 months agoegz21
2 years, 10 months agoegz21
2 years, 10 months agoChaoticda
2 years, 11 months agoUnitel21
2 years, 12 months agoblacksheep6r
3 years, 1 month agoLoneStarChief
3 years, 1 month ago