In this video, we cover the theory behind Access Control vulnerabilities, how to find these types of vulnerabilities from both a white box and black box perspective, how to exploit them and how to prevent them.
▬ ✨ Support Me ✨ ▬▬▬▬▬▬▬▬▬▬
Buy my course: https://bit.ly/30LWAtE
▬ 📖 Contents of this video 📖 ▬▬▬▬▬▬▬▬▬▬
00:00 - Introduction
00:28 - Web Security Academy Course (https://bit.ly/30LWAtE)
01:39 - Agenda
02:25 – What is Broken Access Control?
22:50 – How to Find Access Control Vulnerabilities?
30:29 – How to Exploit Access Control Vulnerabilities?
34:40 – How to Prevent Access Control Vulnerabilities?
39:00 – Resources
39:15 - Thank You
▬ 🔗 Links 🔗 ▬▬▬▬▬▬▬▬▬▬
Video slides: https://github.com/rkhal101/Web-Security-Academy-Series/blob/main/broken-access-control/theory/Broken%20Access%20Control%20Complete%20Guide%20Theory%20Video%20Slides.pdf
Web Security Academy OS Command Injection: https://portswigger.net/web-security/access-control
Cross-Origin Resource Sharing Playlist:
https://www.youtube.com/watch?v=t5FBwq-kudw&list=PLuyTk2_mYISIYD48TavDgJnQRQRZZDsLZ&ab_channel=RanaKhalil
Rana's Twitter account: https://twitter.com/rana__khalil
Hacker Icons made by Freepik: https://www.freepik.com