Cesspit - Authentication - 3

A cesspit with an open iron gate.

Image: A cesspit with an open iron gate.

Just before you are about to jump into the cesspit you notice some scriblings on the dungeon wall on the right side of the cesspit, you jump in, swim closer and notice that the numbers 6946251293 are carved into the stone wall, you commit them to memory, swim across to the gate, enter the numbers on the dial. The lock says click, the gate opens and you enter into the lower part of the castle dungeon.

Note:

Passwords and secrets need protection. You must never write them down on a post-it, commit them to source code, expose, record, send or store them in unencrypted form.

You may mistakingly assume that you don't need to protect passwords and secrets due to the fact that they are hidden, inaccessible or in this case, protected by a stinking cesspit, but a good hacker always find his way around these type of barriers.

Provided by Johan Sydseter

OWASP® Dungeons & Daemons

OWASP Dungeons & Daemons is originally created by Johan Sydseter. It is open source and can be downloaded free of charge from the OWASP website. It is is free to use. It is licensed under the Creative Commons Attribution-ShareAlike 4.0 International, so you can copy, distribute and transmit the work, and you can adapt it, and use it commercially, but all provided that you attribute the work and if you alter, transform, or build upon this work, you may distribute the resulting work only under the same or similar license to this one. OWASP does not endorse or recommend commercial products or services. OWASP Dungeons & Daemons is licensed under the Creative Commons Attribution-ShareAlike 4.0 International license and is © 2024 OWASP Foundation.