2017 OWASP Top 10: Broken Access Control

แชร์
ฝัง
  • เผยแพร่เมื่อ 27 มิ.ย. 2024
  • New 2021 OWASP Lightboard Series:
    • 2021 OWASP Top Ten
    Video 5/10 on the 2017 OWASP Top Ten Security Risks.
    John Wagnon discusses the details of the #5 vulnerability listed in this year's OWASP Top 10 Security Risks: Broken Access Control. Learn about this security risk and how to guard against it.
    community.f5.com/articles/lig...
  • วิทยาศาสตร์และเทคโนโลยี

ความคิดเห็น • 22

  • @rvchandraa687
    @rvchandraa687 3 ปีที่แล้ว +3

    Very Nicely Explained, in easy language & easy to understand

    • @devcentral
      @devcentral  3 ปีที่แล้ว

      glad you enjoyed it!

  • @bigmarkua
    @bigmarkua 4 ปีที่แล้ว +1

    Thanks.

  • @nashrahsarfrazkhan733
    @nashrahsarfrazkhan733 4 ปีที่แล้ว +8

    This is the great tutorial series of OWASP for beginners.

    • @devcentral
      @devcentral  4 ปีที่แล้ว

      glad you enjoyed it!

    • @AwaisEB_
      @AwaisEB_ 3 ปีที่แล้ว +1

      Ap advance hain

  • @jond2372
    @jond2372 6 ปีที่แล้ว +3

    Waiting for A6. Hoping with more offensive examples rather than defensive(security measures).

  • @eitisingh6297
    @eitisingh6297 6 ปีที่แล้ว +14

    Awesome explanation. Just one question how are you able to write in mirror image form

    • @devcentral
      @devcentral  6 ปีที่แล้ว +10

      you can see how we do it here: th-cam.com/video/U7E_L4wCPTc/w-d-xo.html

  • @lilmeow8583
    @lilmeow8583 3 ปีที่แล้ว

    you are awesome !!

  • @laveshmishra5685
    @laveshmishra5685 4 ปีที่แล้ว +1

    Can we have IDOR and missing funtional level qccess control explanation.

  • @HowMean-my6cx
    @HowMean-my6cx 5 ปีที่แล้ว +2

    For Broken Access control - U mentioned only the URL manipulation but even the session can be replaced and manipulated to break the access control. This is just my guess

  • @flowww88
    @flowww88 5 ปีที่แล้ว +2

    You mention that WAF can help on this. Can you give some examples how it can assist? Does it assist in a similar way as DAST or SAST?

    • @devcentral
      @devcentral  5 ปีที่แล้ว +1

      Here are a couple of videos on how WAFs can assist:
      th-cam.com/video/p8CQcF_9280/w-d-xo.html
      th-cam.com/video/HBbDKBV4QW0/w-d-xo.html
      Also, here's one on how DAST/SAST technology can work together with a WAF to secure web applications: th-cam.com/video/dOytmYk9Lhw/w-d-xo.html
      Hope this helps!

  • @ADAMSIVES
    @ADAMSIVES 2 ปีที่แล้ว +1

    He's great at writing backwards

    • @devcentral
      @devcentral  2 ปีที่แล้ว

      this is how we produce the Lightboard Lessons: th-cam.com/video/U7E_L4wCPTc/w-d-xo.html

  • @Rookey_Traveller
    @Rookey_Traveller 4 ปีที่แล้ว

    Is there any difference between access control and authorisation?

    • @roxor0758
      @roxor0758 3 ปีที่แล้ว +1

      Like he said authorisation is verifying user whereas access control is taking access of unwanted data .

    • @sm0na
      @sm0na 2 ปีที่แล้ว +1

      @@roxor0758 isn't quite right. In this video, he's using access control to mean authorization. verifying a user is who they claim to be is _authentication_. verifying an authenticated user has access to a particular resource or service is authorization (or access control).

  • @SaleemSikandar
    @SaleemSikandar 4 ปีที่แล้ว +1

    isn't webapp.com/admin-info is a sensitive data exposure example?

  • @AbdulmajidABatis
    @AbdulmajidABatis 2 ปีที่แล้ว

    F5 WAF can solve this issue just make sure the Tuning of WAF

  • @yazh403
    @yazh403 4 ปีที่แล้ว +1

    could you help me ? actually your voice cant absorb ,can't understand because you spoken fluently.