Aim of the experiment

To understand how Broken Authentication vulnerabilities occur.