Published On Jan 21, 2023
In this video, we cover the theory behind Access Control vulnerabilities, how to find these types of vulnerabilities from both a white box and black box perspective, how to exploit them and how to prevent them.
▬ ✨ Support Me ✨ ▬▬▬▬▬▬▬▬▬▬
Buy my course: https://bit.ly/30LWAtE
▬ 📖 Contents of this video 📖 ▬▬▬▬▬▬▬▬▬▬
00:00 - Introduction
00:28 - Web Security Academy Course (https://bit.ly/30LWAtE)
01:39 - Agenda
02:25 – What is Broken Access Control?
22:50 – How to Find Access Control Vulnerabilities?
30:29 – How to Exploit Access Control Vulnerabilities?
34:40 – How to Prevent Access Control Vulnerabilities?
39:00 – Resources
39:15 - Thank You
▬ 🔗 Links 🔗 ▬▬▬▬▬▬▬▬▬▬
Video slides: https://github.com/rkhal101/Web-Secur...
Web Security Academy OS Command Injection: https://portswigger.net/web-security/...
Cross-Origin Resource Sharing Playlist: • Cross-Origin Resource Sharing (CORS) ...
Rana's Twitter account: / rana__khalil
Hacker Icons made by Freepik: https://www.freepik.com