Broken Access Control | Complete Guide

preview_player
Показать описание
In this video, we cover the theory behind Access Control vulnerabilities, how to find these types of vulnerabilities from both a white box and black box perspective, how to exploit them and how to prevent them.

▬ ✨ Support Me ✨ ▬▬▬▬▬▬▬▬▬▬

▬ 📖 Contents of this video 📖 ▬▬▬▬▬▬▬▬▬▬
00:00 - Introduction
01:39 - Agenda
02:25 – What is Broken Access Control?
22:50 – How to Find Access Control Vulnerabilities?
30:29 – How to Exploit Access Control Vulnerabilities?
34:40 – How to Prevent Access Control Vulnerabilities?
39:00 – Resources
39:15 - Thank You

▬ 🔗 Links 🔗 ▬▬▬▬▬▬▬▬▬▬
Рекомендации по теме
Комментарии
Автор

I know about you for a while now, just started with your videos, but I have to say you are one amazing teacher. Your soft voice and deep knowledge of the subject makes it a lot easier for me. Thank you so much. I will definitely buy your courses.

Stephanus
Автор

This is gold!
I've understood many concepts and solved 40+ labs on the academy website, thanks to your content.
I think I won't miss any single video on this channel!
Wish you all the best ❤❤❤

LeenPh
Автор

Am totally new for IT field, am accountant in the banking industry. But now am learning computer science to be a hacker. I first see you in "David Bombal" YouTube channel interview and now am your follower.
Thank You for Doing This (I really want to buy your course but I can't I am in Ethiopia.

sintayehutsegayeworku
Автор

Nobody teach as good as you, you make this thing easy to learn thanks Rhana❤

gangsternerd
Автор

this is really great. keep up the good work!

uselessvids
Автор

Thank you for the work you've put into making this 🙏🏾

shahid
Автор

This is my first video, I understood everything and I can't wait for the practical explanation شكرا

hdammotowa
Автор

in fact is that I find it difficult to understand everything cuz my English skills are not perfect, but I do my best, and u still the number one to me tho .. so thx so much ma teacher تحية اليك من الجزائر .

mohmino
Автор

يعجبني حماسك والمثابرة شكرا على هذا الشرح

snowden-IT
Автор

I love your videos they're so helpful :)

MFoster
Автор

yes make plz a bonus video about this topic!! thanks

MrBlackhats
Автор

Hi Rana, Want to see how you are using Autorize in burpsuite to check for access contorl bypass

lifeofsq
Автор

Finally Ur back again and on time cause i finish my finals soon 🥰

ahmedmouad
Автор

Thank you mam for such informative videos

riteshasthana
Автор

@rana khalil. 19:58 on this video, it is not vulnerable at all. I will tell the implementations. 1) Every request comes through a middleware which checks the jwt. if the jwt is altered, they will never get this function. since we are getting the id from jwt, we can ensure that the request comes from the owner of the the account. if someone altered id field of jwt, middleware return the request. hope you get it.

nibrasmuhammed
Автор

La explicación es muy clara, excelente video 🌄🌠😉🇨🇴🇨🇴

Davidgonzalez-tpew
Автор

So access control is like permissions????

TheBlackmanIsGod
Автор

please make a video on the extension.🙏

rahulgogra
Автор

Could u upload whole videos which comes under "Access Control vulnerabilities"?

tnt
Автор

Rana I love your content
hope you all best
What about the OSWE , and your progress ?
Have you size it ?

kanimani