Bugcrowd University - Broken Access Control Testing

Поділитися
Вставка
  • Опубліковано 21 гру 2024

КОМЕНТАРІ • 33

  • @yuvraj6279
    @yuvraj6279 3 роки тому +3

    After OWASP NO 1 in 2021

  • @hackersguild8445
    @hackersguild8445 6 років тому +4

    This was the best talk. Just loved this one. I guess I will watch it again in a day or so. :)

  • @nazneenzafar743
    @nazneenzafar743 Рік тому

    Thank you for this presentation Jason.

  • @DJSubstyla
    @DJSubstyla 2 роки тому +2

    Great content!! 😎 Thank you very much Jason 🙌

  • @souhaillepacifique7572
    @souhaillepacifique7572 4 роки тому +4

    ❤🙏 thanks man happy to know you

  • @Bo-cv9ic
    @Bo-cv9ic 3 роки тому +2

    This is amazing information. Thank you for this.

  • @lenevoyogatab3
    @lenevoyogatab3 3 роки тому

    on point, thankssettings page or profile page of an application has lot of idor possibility, enjoy

  • @dxsp1d3r
    @dxsp1d3r 6 років тому

    Waiting for the next module Very Well Explained

  • @Pecinta_wanita11
    @Pecinta_wanita11 2 місяці тому

    Thanks for sharing.. god bless you ❤

  • @saivenkatmaheshwaram9868
    @saivenkatmaheshwaram9868 3 роки тому

    superb video and clear explanation..........

  • @InfoSecIntel
    @InfoSecIntel 5 років тому

    This is great I have one question why would the ADMIN in uppercase be accessible when in lowercase it isn’t? Does that just mean the admin in lowercase file doesn’t exist but the ADMIN in uppercase page does?

    • @noy5626
      @noy5626 4 роки тому

      I think it has to do with a filter bypass. E.g. the waf is checking for /admin but when the request reaches the backend system, it lower cases the path by default. Thus, putting /ADMIN bypasses the waf. I could be wrong. I’m still new too. Hope that helps :)

    • @elijahrodgers9029
      @elijahrodgers9029 4 роки тому

      @@noy5626 you're right

  • @cacurazi
    @cacurazi 3 роки тому

    what is GUID?

  • @tanercoder1915
    @tanercoder1915 4 роки тому

    where can I find an the videos of modules?

  • @adamde1990
    @adamde1990 4 роки тому

    Does anyone know of any hacks/data breaches that have occured as a result of broken access control that i could read up on?

  • @benjaminmcewan5313
    @benjaminmcewan5313 6 років тому

    Thanks for posting.. your content is awesome always

  • @R3v3rs3_sh3ll
    @R3v3rs3_sh3ll 4 роки тому +1

    Thank you

  • @youfather38392
    @youfather38392 2 роки тому +1

    Who's here after 4 years in Aug 2022

  • @anfsec
    @anfsec 4 роки тому +1

    i need this ppt

  • @haroonrehman9489
    @haroonrehman9489 2 роки тому +1

    Are These Tricks relevant in 2022?

    • @aryzen2781
      @aryzen2781 2 роки тому +1

      yes, broken access control jumped from 5th to number 1 most common vulnerabilites.

  • @satishranga5264
    @satishranga5264 6 років тому

    please share sql vulunerabilitrs sql I sql Boolean timebase

  • @peterchari3839
    @peterchari3839 4 роки тому

    Informative stuff

  • @syednooruddin2017
    @syednooruddin2017 4 роки тому +1

    Plz make us understand to make a video

  • @X1Aman1X
    @X1Aman1X 2 роки тому

    HEY!! PLEASE UPDATE THE CONTENT

  • @manojd3368
    @manojd3368 6 років тому

    not clearly audible.. Please change

  • @fauzibariqmahya8667
    @fauzibariqmahya8667 3 роки тому

    i have been finish

  • @mouhssineezzahy8160
    @mouhssineezzahy8160 6 років тому

    up pro go on please