Abstract: The expansion of internet connectivity has increased development of many websites. There are several means of authentication mechanisms for every user to use those web applications. Of them password based authentication is widely used. User may show interest in working with other different applications but it becomes inconvenient for a user to remember several different passwords. So he/she uses same password in one domain to another domain. This leads to one of the cyber security threat called as shadow attacks.
Keywords: Authentication, Shadow Attacks, Cyber Security.