OWASP Periodic Table of Vulnerabilities - Weak Authentication Methods

Root Cause Summary
Usage of weak HTTP authentication methods makes it easiy for an attacker to obtain logon credentials by intercepting the traffic

Browser / Standards Solution
None

Perimeter Solution

 * Disable the HTTP Basic Access Authentication Scheme
 * Enable NTLM, and Digest Authentication requests

Complexity: Low Impact: Medium

Generic Framework Solution
None

Custom Framework Solution
None

Custom Code Solution
None