OWASP Top 10 2025: IAAA Failures Writeup

Date: 17-11-2025 | Platform: TryHackMe | Difficulty: Easy

Overview

Learn about A01, A07, and A09 in how they relate to failures in the applied IAAA model. This TryHackMe room explores the OWASP Top 10 2025 categories that involve failures in Identification, Authentication, Authorization, and Accounting (IAAA) security controls.

The IAAA Security Model

What does IAAA stand for?

Answer: Identity, Authentication, Authorisation, Accountability

The IAAA model represents the four fundamental security controls that protect systems and data:

Failures in any of these areas can lead to severe security vulnerabilities, as covered in the OWASP Top 10 2025.

OWASP Top 10 2025 Categories Covered

A01:2025 - Broken Access Control

Broken Access Control occurs when restrictions on what authenticated users are allowed to do are not properly enforced.

A07:2025 - Identification and Authentication Failures

Previously known as A02:2021 Broken Authentication, this category covers failures in authentication mechanisms.

A09:2025 - Security Logging and Monitoring Failures

Previously A10:2021 Insufficient Logging & Monitoring, this category covers failures in security event detection and response.

A01:2025 - Broken Access Control

What is Broken Access Control?

Broken Access Control occurs when an application does not properly restrict user access to sensitive resources or functions. This allows users to perform actions they shouldn't be authorized to do.

Common Attack Patterns

Prevention Measures

Testing for Broken Access Control

Practical Questions

2.1 If you don't get access to more roles but can view the data of another users, what type of privilege escalation is this?

Answer: Horizontal

2.2 What is the note you found when viewing the user's account who had more than $ 1 million?

Answer: THM{Found.the.Millionare!}

3. What is the flag on the admin user's dashboard?

Answer: THM{Account.confusion.FTW!}

A07:2025 - Identification and Authentication Failures

Authentication vs Authorization

While often confused, authentication and authorization serve different purposes:

Common Authentication Vulnerabilities

Session Management Best Practices

Password Security

A09:2025 - Security Logging and Monitoring Failures

Importance of Logging

Effective logging and monitoring are crucial for:

Common Logging Failures

What to Log

Log Management Best Practices

Practical Questions

4.1 It looks like an attacker tried to perform a brute-force attack, what is the IP of the attacker?

Answer: 203.0.113.45

4.2 Looks like they were able to gain access to an account! What is the username associated with that account?

Answer: admin

4.3 What action did the attacker try to do with the account? List the endpoint the accessed.

Answer: /supersecretadminstuff

IAAA Model in Practice

Identification Failures

Authentication Failures

Authorization Failures

Accounting Failures

Practical Examples

Broken Access Control Example

# Vulnerable URL pattern
/user/profile?id=123

# Attacker can access other users' profiles by changing the ID
/user/profile?id=124
/user/profile?id=125

Authentication Failure Example

# Weak session management
Set-Cookie: session_id=123456; Path=/; HttpOnly

# Predictable session IDs can be brute-forced
Set-Cookie: session_id=123457; Path=/; HttpOnly
Set-Cookie: session_id=123458; Path=/; HttpOnly

Logging Failure Example

# Missing critical security events
[INFO] User login successful: admin
[INFO] File uploaded: document.pdf
# No logging of failed authentication attempts
# No logging of authorization failures

Testing Methodology

Authentication Testing

Authorization Testing

Logging Testing

OWASP Testing Guide References

Defense in Depth

Multi-Layer Security

Zero Trust Architecture

Industry Standards and Compliance

Relevant Standards

Compliance Requirements

Tools and Resources

Testing Tools

Monitoring Tools

Resources

Real-World Impact

IAAA failures are responsible for the majority of data breaches:

Lessons Learned