Weakness, Attack, Exploitation Patterns learnt by YGN Ethical Hacker Group
Friday, January 7, 2011
Weak Fraud Check vulnerable to Brute Force
We've seen a fraud check is being used in some web applications such as billings, and email registration such as Gmail. Here, a traditional habit is still used by developers. This is verification by digits only.