In this video, we cover the theory behind Access Control vulnerabilities, how to find these types of vulnerabilities from both a white box and black box perspective, how to exploit them and how to prevent them.
▬ ✨ Support Me ✨ ▬▬▬▬▬▬▬▬▬▬
Buy my course: bit.ly/30LWAtE
▬ 📖 Contents of this video 📖 ▬▬▬▬▬▬▬▬▬▬
00:00 - Introduction
00:28 - Web Security Academy Course (bit.ly/30LWAtE)
01:39 - Agenda
02:25 - What is Broken Access Control?
22:50 - How to Find Access Control Vulnerabilities?
30:29 - How to Exploit Access Control Vulnerabilities?
34:40 - How to Prevent Access Control Vulnerabilities?
39:00 - Resources
39:15 - Thank You
▬ 🔗 Links 🔗 ▬▬▬▬▬▬▬▬▬▬
Video slides: github.com/rkhal101/Web-Security-Academy-Series/blob/main/broken-access-control/theory/Broken%20Access%20Control%20Complete%20Guide%20Theory%20Video%20Slides.pdf
Web Security Academy OS Command Injection: portswigger.net/web-security/access-control
Cross-Origin Resource Sharing Playlist: ru-vid.com/video/%D0%B2%D0%B8%D0%B4%D0%B5%D0%BE-t5FBwq-kudw.html&ab_channel=RanaKhalil
Rana's Twitter account: rana__khalil
Hacker Icons made by Freepik: www.freepik.com
21 янв 2023