OWASP A02:2021 - Cryptographic Failures
Overview
What are Cryptographic Failures?
Common Vulnerabilities
1. Weak or Missing Encryption
2. Insecure Data Transmission
3. Poor Key Management
4. Weak Random Number Generation
5. Certificate and TLS Issues
Testing Methodology
1. Information Gathering
2. SSL/TLS Testing
3. Certificate Analysis
4. Data Transmission Analysis
Common Attack Vectors
1. Man-in-the-Middle (MITM) Attacks
2. Padding Oracle Attacks
3. Weak Hash Exploitation
4. Key Recovery Attacks
Tools and Techniques
SSL/TLS Testing Tools
Cryptographic Analysis Tools
Network Analysis
Exploitation Examples
Example 1: Weak Hash Function Exploitation
Example 2: SSL/TLS Downgrade Attack
Example 3: Hardcoded Key Extraction
Example 4: CBC Padding Oracle Attack
Impact Assessment
Data at Risk
Attack Scenarios
Prevention and Mitigation
1. Use Strong Cryptographic Algorithms
2. Proper SSL/TLS Configuration
3. Secure Password Hashing
4. Secure Key Management
Testing Checklist
Data Protection Assessment
Cryptographic Implementation Testing
Protocol Security Testing
Application-Level Crypto Testing
Advanced Testing Techniques
Side-Channel Analysis
Entropy Analysis
Reporting Template
Finding: Cryptographic Failure - [Specific Issue]
Last updated