⚠️ Security Warning: This login system contains multiple authentication vulnerabilities!
NEVER implement authentication like this in real applications!
NEVER implement authentication like this in real applications!
🔐 System Login
Demo User Accounts:
- admin / admin
- user / password
- guest / guest
- test / test
- admin / password123
🎯 Authentication Vulnerabilities Demonstrated
1. Weak Default Credentials
Common username/password combinations that work:
admin/admin, admin/password, user/password, guest/guest, test/test
2. No Account Lockout
Try as many wrong passwords as you want - no lockout!
3. Predictable Session IDs
Session IDs are sequential and predictable:
Session1001, Session1002, Session1003...
// Easy to guess other users' sessions!
4. Client-Side Role Validation
Role is stored in JavaScript - easily manipulated!
5. Insecure Password Storage
Passwords stored in plain text in JavaScript array:
// 🚨 NEVER do this!
const users = [
{username: 'admin', password: 'admin', role: 'admin'},
{username: 'user', password: 'password', role: 'user'}
];
⚔️ Authentication Attack Testing
SQL Injection Attempts
Try these payloads in the username field:
Session Manipulation
Privilege Escalation
Attack attempt log will appear here...
📊 Login Attempt Monitor
Total Attempts: 0
Failed Attempts: 0
Success Rate: 0%
Login attempts will be logged here...