The Authentication section covers attacks that target a web site’s method of validating the identity of a user, service or application. Authentication is performed using at least one of three mechanisms: “something you have”, “something you know” or “something you are”. This section will discuss the attacks used to circumvent or exploit the authentication process of a web site.