2017 OWASP Top 10: Broken Access Control

Поделиться
HTML-код
  • Опубликовано: 19 ноя 2024

Комментарии • 23

  • @nashrahsarfrazkhan733
    @nashrahsarfrazkhan733 5 лет назад +9

    This is the great tutorial series of OWASP for beginners.

  • @rvchandraa687
    @rvchandraa687 4 года назад +4

    Very Nicely Explained, in easy language & easy to understand

  • @jxkz7
    @jxkz7 Месяц назад

    I want more videos like these.❤❤❤ great content, sir

  • @jond2372
    @jond2372 6 лет назад +3

    Waiting for A6. Hoping with more offensive examples rather than defensive(security measures).

  • @eitisingh6297
    @eitisingh6297 6 лет назад +14

    Awesome explanation. Just one question how are you able to write in mirror image form

    • @devcentral
      @devcentral  6 лет назад +10

      you can see how we do it here: ruclips.net/video/U7E_L4wCPTc/видео.html

  • @HowMean-my6cx
    @HowMean-my6cx 5 лет назад +2

    For Broken Access control - U mentioned only the URL manipulation but even the session can be replaced and manipulated to break the access control. This is just my guess

  • @ADAMSIVES
    @ADAMSIVES 2 года назад +1

    He's great at writing backwards

    • @devcentral
      @devcentral  2 года назад

      this is how we produce the Lightboard Lessons: ruclips.net/video/U7E_L4wCPTc/видео.html

  • @flowww88
    @flowww88 6 лет назад +2

    You mention that WAF can help on this. Can you give some examples how it can assist? Does it assist in a similar way as DAST or SAST?

    • @devcentral
      @devcentral  6 лет назад +1

      Here are a couple of videos on how WAFs can assist:
      ruclips.net/video/p8CQcF_9280/видео.html
      ruclips.net/video/HBbDKBV4QW0/видео.html
      Also, here's one on how DAST/SAST technology can work together with a WAF to secure web applications: ruclips.net/video/dOytmYk9Lhw/видео.html
      Hope this helps!

  • @bigmarkua
    @bigmarkua 4 года назад +1

    Thanks.

  • @laveshmishra5685
    @laveshmishra5685 4 года назад +1

    Can we have IDOR and missing funtional level qccess control explanation.

  • @lilmeow8583
    @lilmeow8583 4 года назад

    you are awesome !!

  • @Rookey_Traveller
    @Rookey_Traveller 4 года назад

    Is there any difference between access control and authorisation?

    • @roxor0758
      @roxor0758 4 года назад +1

      Like he said authorisation is verifying user whereas access control is taking access of unwanted data .

    • @sm0na
      @sm0na 3 года назад +1

      @@roxor0758 isn't quite right. In this video, he's using access control to mean authorization. verifying a user is who they claim to be is _authentication_. verifying an authenticated user has access to a particular resource or service is authorization (or access control).

  • @AbdulmajidABatis
    @AbdulmajidABatis 3 года назад

    F5 WAF can solve this issue just make sure the Tuning of WAF

  • @SaleemSikandar
    @SaleemSikandar 4 года назад +1

    isn't webapp.com/admin-info is a sensitive data exposure example?

  • @yazh403
    @yazh403 5 лет назад +1

    could you help me ? actually your voice cant absorb ,can't understand because you spoken fluently.