2021 OWASP Top Ten: Broken Access Control

Поділитися
Вставка
  • Опубліковано 9 лют 2025

КОМЕНТАРІ • 28

  • @mohammedyaseerpasha7909
    @mohammedyaseerpasha7909 9 місяців тому +6

    one of the best explanations so far. Thanks, Man.

  • @happyangela5503
    @happyangela5503 24 дні тому +1

    Best explanation so far ,thank you

  • @pipersmom5961
    @pipersmom5961 4 місяці тому +2

    Is it possible to get F5's permission for us to convert the videos to MP4 for training our Devs?

    • @JasonRahm
      @JasonRahm 4 місяці тому

      that's fine as long as you keep attribution to F5

    • @pipersmom5961
      @pipersmom5961 4 місяці тому

      @@JasonRahm Absolutely! Your videos are fabulous, and we'll put you in the credits and keep attribution to F5

  • @TannerLaMarche
    @TannerLaMarche 8 місяців тому +2

    Hi, F5 DevCentral team. I have a copyright question. Since the information in this video is covered by the Creative Commons License 3.0, is this video, by nature, available to re-use in educational material my company distributes? I've been trying to find good video content covering OWASP Top 10 (instead of making it in-house) and came across your videos. I would like to know if we can redistribute your UA-cam series as part of our product?

    • @JasonRahm
      @JasonRahm 8 місяців тому +2

      You can use the OWASP videos in your training…we only ask that you give proper attribution to F5/DevCentral so that the viewers will know who made these videos.

    • @TMLaDesign
      @TMLaDesign 8 місяців тому

      Absolutely, we will give attribution and link to the original video to follow the Creative Commons license - thank you!

  • @sampalaravikumar1912
    @sampalaravikumar1912 Рік тому +1

    Very good❤

  • @BerniesBastelBude
    @BerniesBastelBude 3 роки тому +7

    explained well - thx!

    • @devcentral
      @devcentral  3 роки тому

      Thanks for the comment! Glad you enjoyed the video!

  • @CameronSpear
    @CameronSpear 2 роки тому +8

    This is a really important question: is this guy really good at writing backwards, or did you get a special mirrored shirt made just for these videos?

    • @devcentral
      @devcentral  2 роки тому +1

      Thanks for the comment! This is how we produce these: ua-cam.com/video/U7E_L4wCPTc/v-deo.html

    • @CameronSpear
      @CameronSpear 2 роки тому +2

      @@devcentral So you do have special shirts. Nice! Thanks for the reply.

    • @MrAdemiM
      @MrAdemiM Рік тому +1

      @@devcentral should've gone with writing backwards man, i'm kinda disappointed now. nonetheless, awesome videos, needed some of those to refresh some security knowledge!

  • @RB-qu1lv
    @RB-qu1lv 2 роки тому +2

    Nice explaination brother.

    • @devcentral
      @devcentral  2 роки тому

      Thanks for watching and we appreciate the comment!

  • @lukethelabrador8325
    @lukethelabrador8325 2 роки тому +2

    how is it different from SQL injection? *new to cyber security*

    • @devcentral
      @devcentral  2 роки тому

      Thanks for the comment! Here's the full OWASP Top 10 playlist ua-cam.com/video/uu7o6hEswVQ/v-deo.html&ab_channel=F5DevCentral
      and specifically Injection: ua-cam.com/video/GSuZPwsil0g/v-deo.html

    • @qazwacook1983
      @qazwacook1983 2 роки тому +2

      SQL is a different thing yet if you would use a SQL injection to try to log in to a app and end up being succefull it would enter the category of broken access control.

  • @ahmedgamal1588
    @ahmedgamal1588 2 роки тому +2

    Thanks sir!

  • @patrickborys3490
    @patrickborys3490 2 роки тому +3

    The only thing in my head hearing that is HOW T.F. do you write ? I mean is there somewhere and somehow a mirror that let you write like this ? Or do you simple practice to write like that :P?

    • @devcentral
      @devcentral  2 роки тому

      Thanks for the comment! Here's how we produce these: ua-cam.com/video/U7E_L4wCPTc/v-deo.html

  • @alekivk
    @alekivk 4 місяці тому +1

    Broken Volume Control

  • @Double-NH
    @Double-NH 3 роки тому +1

    Can you illustrate a bit about Record Ownership? What does it mean?

    • @isaacsmooth5134
      @isaacsmooth5134 Рік тому

      Basically you limit logged in users to access only the records they own.For example you can login to a system and try to change the Id so that you access another user's data. In this case the system should limit the logged in user to only have access to their own data

  • @harshitdagar
    @harshitdagar Рік тому +1

    bekar video kuch smj nhi aaya