Broken Access Control | Complete Guide

Поділитися
Вставка
  • Опубліковано 21 гру 2024

КОМЕНТАРІ • 58

  • @RanaKhalil101
    @RanaKhalil101  Рік тому +7

    📚📚 Don't want to wait for the weekly release schedule to gain access to all the videos and want to be added to a discord server where you can ask questions? Make sure to sign up to my course: bit.ly/30LWAtE

  • @Stephanus21
    @Stephanus21 Рік тому +17

    I know about you for a while now, just started with your videos , but I have to say you are one amazing teacher. Your soft voice and deep knowledge of the subject makes it a lot easier for me. Thank you so much. I will definitely buy your courses.

  • @LeenPh
    @LeenPh Рік тому +2

    This is gold!
    I've understood many concepts and solved 40+ labs on the academy website, thanks to your content.
    I think I won't miss any single video on this channel!
    Wish you all the best ❤❤❤

  • @ECHoBEaTS2024-et
    @ECHoBEaTS2024-et Рік тому

    Am totally new for IT field, am accountant in the banking industry. But now am learning computer science to be a hacker. I first see you in "David Bombal" UA-cam channel interview and now am your follower.
    Thank You for Doing This (I really want to buy your course but I can't I am in Ethiopia.

  • @gangsternerd8419
    @gangsternerd8419 Рік тому +1

    Nobody teach as good as you, you make this thing easy to learn thanks Rhana❤

  • @nibrasmuhammed5105
    @nibrasmuhammed5105 Рік тому +1

    @rana khalil. 19:58 on this video, it is not vulnerable at all. I will tell the implementations. 1) Every request comes through a middleware which checks the jwt. if the jwt is altered, they will never get this function. since we are getting the id from jwt, we can ensure that the request comes from the owner of the the account. if someone altered id field of jwt, middleware return the request. hope you get it.

    • @kit4unez
      @kit4unez Рік тому +2

      No. How does authentication middleware prevents attacker to exploit this piece of code? Even if I am authenticated as user1 and order with id 2 (for example) was created by user2, I still can make a DELETE request to /orders/2/ and delete that order, because there was no access control in that piece of code

    • @nibrasmuhammed5105
      @nibrasmuhammed5105 Рік тому

      @@kit4unez talking about IDOR?

    • @richardIambert
      @richardIambert 3 місяці тому

      I think the purpose of the code review was to get people thinking about some of the ways in which broken auth vulnerabilites can be introduced into an app. Later in the video (~30:00), Rana explains that the vulnerability introduced by this code could be mitigated by performing access control checks elsewhere in the application, which checking the contents and integrity of a JWT in middleware would be an example of.

  • @1990shahid
    @1990shahid Рік тому +2

    Thank you for the work you've put into making this 🙏🏾

  • @uselessvids5872
    @uselessvids5872 2 місяці тому

    this is really great. keep up the good work!

  • @mohmino4532
    @mohmino4532 Рік тому

    in fact is that I find it difficult to understand everything cuz my English skills are not perfect, but I do my best, and u still the number one to me tho .. so thx so much ma teacher تحية اليك من الجزائر .

  • @lifeofsq5653
    @lifeofsq5653 Рік тому

    Hi Rana, Want to see how you are using Autorize in burpsuite to check for access contorl bypass

  • @hdammotowa9695
    @hdammotowa9695 Рік тому

    This is my first video, I understood everything and I can't wait for the practical explanation شكرا

  • @MFoster392
    @MFoster392 Рік тому +4

    I love your videos they're so helpful :)

  • @ahmedmouad344
    @ahmedmouad344 Рік тому

    Finally Ur back again and on time cause i finish my finals soon 🥰

  • @snowden-IT
    @snowden-IT Рік тому

    يعجبني حماسك والمثابرة شكرا على هذا الشرح

  • @Ahmed-s3d5u
    @Ahmed-s3d5u 4 місяці тому

    thank you for course ❤❤❤

  • @maakthon5551
    @maakthon5551 Рік тому

    Simple and forward , Thanks!

  • @Axel-rs3cg
    @Axel-rs3cg Рік тому

    really well explained ✌🏽

  • @riteshasthana7824
    @riteshasthana7824 11 місяців тому

    Thank you mam for such informative videos

  • @MrBlackhats
    @MrBlackhats Рік тому

    yes make plz a bonus video about this topic!! thanks

  • @rahulgogra7089
    @rahulgogra7089 Рік тому

    please make a video on the extension.🙏

  • @xbaleks4609
    @xbaleks4609 Рік тому

    Chokrane Bzaff !
    Thank You so much !

  • @paulojr1384
    @paulojr1384 Рік тому

    Thank you Hana

  • @Davidgonzalez-tp4ew
    @Davidgonzalez-tp4ew Рік тому

    La explicación es muy clara, excelente video 🌄🌠😉🇨🇴🇨🇴

  • @ECHoBEaTS2024-et
    @ECHoBEaTS2024-et Рік тому

    Thank You for doing this

  • @css2165
    @css2165 Рік тому

    great video. will you upload ctf examples?

  • @gajendraupadhyay6740
    @gajendraupadhyay6740 Рік тому

    Its really good...👍👍keep it up..

  • @shayansec
    @shayansec Рік тому

    Great vid...Just revised this vuln.

  • @TheBlackmanIsGod
    @TheBlackmanIsGod Рік тому

    So access control is like permissions????

  • @balasubramaniamgopal8437
    @balasubramaniamgopal8437 Рік тому

    Brilliant !!

  • @tnt7298
    @tnt7298 Рік тому

    Could u upload whole videos which comes under "Access Control vulnerabilities"?

  • @Donut-qt9mr
    @Donut-qt9mr Рік тому

    thanksyou for the valueable content

  • @AamirAr-b2n
    @AamirAr-b2n Рік тому

    Great job, Thank you from 🇵🇰

  • @FaultyGlitch
    @FaultyGlitch Рік тому

    Thank you

  • @sakura-gd8nh
    @sakura-gd8nh 7 місяців тому

    Where can I use the lab is it free?????

  • @kanimani8226
    @kanimani8226 Рік тому

    Rana I love your content
    hope you all best
    What about the OSWE , and your progress ?
    Have you size it ?

  • @suyunovjasurbek
    @suyunovjasurbek 9 місяців тому

    i like you'r vedios. thanks Mrs

  • @brudora3096
    @brudora3096 Рік тому

    Thanks those videos ❤❤

  • @Love-yv1fc
    @Love-yv1fc Рік тому

    Thank you❤

  • @amin_alaa
    @amin_alaa Рік тому

    thanks

  • @Shintowel
    @Shintowel Рік тому

    Love u sister please how to use autorize

  • @rolamahmoud9678
    @rolamahmoud9678 Рік тому

    يعطيكي العافية انسة رنا يا ريت تعملي فيديوهات بالعربي وشكرا

  • @chowdhurytowhidahmed7780
    @chowdhurytowhidahmed7780 Рік тому

    Love from by heart

  • @css2165
    @css2165 Рік тому

    perfection

  • @saadeddine6418
    @saadeddine6418 Рік тому

    think you sister you the best

  • @omarkalom1962
    @omarkalom1962 Рік тому

    Thanks from 🇮🇱✌️

  • @CRYSTAL-fd4fw
    @CRYSTAL-fd4fw 10 місяців тому

    Mashalla sesiter

  • @noorrehman6344
    @noorrehman6344 Рік тому

    Please make web hacking course for udemy

  • @gaelslv2068
    @gaelslv2068 5 місяців тому

    عربيه واضح من الصوت

  • @Omar0x_7
    @Omar0x_7 Рік тому

    يا لو الشرح ده بالعربي

  • @ctc8998
    @ctc8998 9 місяців тому

    bring back cortex

  • @Matinirx
    @Matinirx Рік тому

    🤘🏻👌

  • @TheCyberWarriorGuy
    @TheCyberWarriorGuy Рік тому

    :)

  • @Aquax1000
    @Aquax1000 2 місяці тому

    Do something with your voice

  • @sayantandatta2996
    @sayantandatta2996 Рік тому

    Kindly update theic or speak louder please

  • @mohamedmahrous9500
    @mohamedmahrous9500 Рік тому

    thank you ❤❤