<?xml version="1.0" encoding="UTF-8"?>
<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:dc="http://purl.org/dc/elements/1.1/">
  <channel>
    <title>DEV Community: Cecilia986</title>
    <description>The latest articles on DEV Community by Cecilia986 (@cecilia986).</description>
    <link>https://dev.to/cecilia986</link>
    <image>
      <url>https://media2.dev.to/dynamic/image/width=90,height=90,fit=cover,gravity=auto,format=auto/https:%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Fuser%2Fprofile_image%2F3839997%2Fb38cff1e-0113-4aeb-a078-621ce59d7f47.png</url>
      <title>DEV Community: Cecilia986</title>
      <link>https://dev.to/cecilia986</link>
    </image>
    <atom:link rel="self" type="application/rss+xml" href="https://dev.to/feed/cecilia986"/>
    <language>en</language>
    <item>
      <title>Security Testing: User Login Scenarios</title>
      <dc:creator>Cecilia986</dc:creator>
      <pubDate>Mon, 23 Mar 2026 11:57:15 +0000</pubDate>
      <link>https://dev.to/cecilia986/security-testing-user-login-scenarios-2i4k</link>
      <guid>https://dev.to/cecilia986/security-testing-user-login-scenarios-2i4k</guid>
      <description>&lt;p&gt;*&lt;em&gt;Security Testing Overview *&lt;/em&gt;&lt;/p&gt;

&lt;blockquote&gt;
&lt;p&gt;Security testing encompasses many areas and utilizes a variety of tools. **AppScan **is the most comprehensive, covering nearly all security vulnerabilities and providing detailed security audit reports.&lt;/p&gt;
&lt;/blockquote&gt;

&lt;p&gt;&lt;strong&gt;User Login Security:&lt;/strong&gt;&lt;br&gt;
A. Password Issues &lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;Verify if user passwords stored in the backend are encrypted .&lt;/li&gt;
&lt;li&gt;Verify if passwords are encrypted during network transmission(e.g., using HTTPS/TLS).&lt;/li&gt;
&lt;li&gt;Verify password expiration policies and ensure the system prompts users to change passwords upon expiry.&lt;/li&gt;
&lt;li&gt;Verify if the password input field supports copying and pasting (often disabled for higher security).&lt;/li&gt;
&lt;li&gt;Validate password complexity and strength.&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;B. User Authentication &amp;amp; Session Management &lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;&lt;p&gt;Forced Browsing / Unauthorized Access: Verify if entering a post-login URL directly in the address bar redirects the user back to the login page.&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;Sensitive Data in Source Code: Ensure that passwords entered in the input field are not visible in the page source code(View Source).&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;Session Mutex / Concurrent Login: Verify if a user is kicked out (mutually exclusive) when logging in from another device or browser.&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;Brute Force Protection: Verify if the system triggers a lockout or CAPTCHA after multiple failed login attempts to prevent brute force attacks.&lt;/p&gt;&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;C. Common Web Attacks &lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;&lt;p&gt;SQL Injection: Input SQL injection strings into the username/password fields to verify system error handling and data protection.&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;Cross-Site Scripting (XSS): Input XSS scripts to verify if the system's behavior or page content is tampered with.&lt;/p&gt;&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;Other details:&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;How Encryption Works During Transmission?&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;Encryption during transmission is handled primarily by HTTPS, which is HTTP running over TLS (Transport Layer Security). Here is the simplified process:&lt;/p&gt;

&lt;p&gt;Step 1: The TLS Handshake &lt;br&gt;
When your browser connects to a bank's server, they perform a "handshake" to agree on how to encrypt the data.&lt;/p&gt;

&lt;p&gt;The server sends its Digital Certificate and Public Key &lt;br&gt;
The browser verifies the certificate's validity.&lt;/p&gt;

&lt;p&gt;Step 2: Key Exchange &lt;br&gt;
The browser generates a temporary Symmetric Key and encrypts it using the server's Public Key. Only the server can decrypt this using its Private Key.&lt;/p&gt;

&lt;p&gt;Step 3: Encrypted Session&lt;br&gt;
Now, both the browser and the server have the same "secret key." All data sent, including the username and password, is encrypted using this key. Even if a hacker intercepts the data packet, they will only see "garbage" text.&lt;/p&gt;

&lt;p&gt;*&lt;em&gt;How to Verify password encryption? *&lt;/em&gt;&lt;br&gt;
Use tools like Wireshark or Fiddler/Charles Proxy to verify this:&lt;/p&gt;

&lt;ol&gt;
&lt;li&gt;&lt;p&gt;Check the Protocol): Ensure the URL starts with https:// and the browser shows a padlock icon.&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;Check Packet Sniffing: Open Wireshark. Capture traffic while logging in.&lt;br&gt;
Result: You should see "TLSv1.2" or "TLSv1.3" packets. If you can see the password in the "Post Data" section, the encryption is failing.&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;Check Frontend Hashing: Some high-security systems also hash the password on the client-side (using JavaScript/TypeScript) before sending it, so even the "encrypted" transmission doesn't contain the raw password.&lt;/p&gt;&lt;/li&gt;
&lt;/ol&gt;

</description>
      <category>cybersecurity</category>
      <category>security</category>
      <category>testing</category>
      <category>tutorial</category>
    </item>
  </channel>
</rss>
