You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Currently there's no protection against bruteforcing passwords of username. An attacker could use a predefined dictionary for getting the users password.
As a solution logins attemps, especially unsuccessfully ones, of last 24hrs need to be stored in a database. Therefor shortened IP address and timestamp should be used.
Serveral attemps could cause a delay(max 5 sec.) and after a numbered attemps (5?) user could be prompted to insert a capture to hinder several bruteforce attemps at a time.
The text was updated successfully, but these errors were encountered:
I've created a new table. But after validating it I've noticed that we already have a table 'user'. So I wonder if we really need a new table. To avoid overhead wouldn't it be better to add columns to the existing table like unsuccessful login attemps and last login?
I'd argue that you'd want to record individual login attempts to have some flexibility, i.e. allowing 3 login attempts in 5 minutes or 30 login in 24 hours etc.
Having the history of failed login attempts is also necessary to recognize whether a sytematic attack on an account is in progress.
Currently there's no protection against bruteforcing passwords of username. An attacker could use a predefined dictionary for getting the users password.
As a solution logins attemps, especially unsuccessfully ones, of last 24hrs need to be stored in a database. Therefor shortened IP address and timestamp should be used.
Serveral attemps could cause a delay(max 5 sec.) and after a numbered attemps (5?) user could be prompted to insert a capture to hinder several bruteforce attemps at a time.
The text was updated successfully, but these errors were encountered: