Broken Object Level Authorization (BOLA) Explained

แชร์
ฝัง
  • เผยแพร่เมื่อ 29 ก.ย. 2024

ความคิดเห็น • 24

  • @youcef2851
    @youcef2851 ปีที่แล้ว +5

    thanks sir , i'd suggest to continue with web app exploitation even meduim and low risk vulns xss xst csrf ... things may help us in bug bounty hunting

  • @TodiDiang
    @TodiDiang ปีที่แล้ว

    Main bola dlu gk sih 😅☝

  • @Hacker_Baby
    @Hacker_Baby ปีที่แล้ว +4

    TCM just keeps getting better and better!! Love the content! Keep it coming!!

  • @mihaia.4031
    @mihaia.4031 ปีที่แล้ว +2

    I try to explain a similar problem (let's call it Code-BOLA or CBOLA) to my colleagues, but to an even deeper level: programmatic, or object-design level. It's about proper object abstraction and encapsulation, which is a very debated topic in Object-Oriented Programming.
    So for example, say you have endpoint GET /users/{userId}.
    What you talk about is the end-user (or the runtime, if you will) Authentication/Authorization, but also, we should do it at coding-time, so to speak. Your object structure/composition/hierarchy, your very code, should be designed in such a way that not even you, the programmer, should be able to get the wrong User object and return it from your endpoint.
    This idea of mine, of course, goes against many mainstream things that people do in OOP. As long as everything is a public service, injectable by your DI Container everywhere and anywhere, you cannot achieve this level of proper abstraction and encapsulation.
    So, if you, the programmer, can instantiate the User class with any ID, or can simply inject a UserService and call findById with any ID, you already have what I would call a BOLA at code-design level.
    Of course, as a programmer, you can change the code in any way you want, but the point is, you should have an architecture in place, to guide your code. It should be obvious for you, the programmer, that changing a lot of code just to get a User is NOT the way to go and you're doing something wrong if you really have to start changing stuff around.
    Did you ever explore such ideas, what do you think about it?

    • @ramirosandoval781
      @ramirosandoval781 ปีที่แล้ว +1

      Interesting, but then how would you do it?

  • @faycalnabaoui9550
    @faycalnabaoui9550 ปีที่แล้ว +2

    Hello sir, great video!
    It would be lovely if you could make a video about XXE vulnerability.
    Thanks

  • @adityach1985
    @adityach1985 ปีที่แล้ว +1

    Hi, Great Video, thanks !!
    My request is, can you make a video explaining regarding encryption, algorithms, Jack the ripper tool for different hash formats, how to identify the hashes or so !

  • @ahmadzubair654
    @ahmadzubair654 ปีที่แล้ว

    your chair looks too comfortable, what brand is that?

  • @fisix-
    @fisix- ปีที่แล้ว

    Volume is leveled too low despite that huge microphone

  • @jareda8943
    @jareda8943 ปีที่แล้ว +1

    These videos are gold

  • @imosolar
    @imosolar ปีที่แล้ว

    Please create a show that bypass waf 402

  • @blackhood7021
    @blackhood7021 ปีที่แล้ว +1

    hello tcm!

  • @aaftabahmed6876
    @aaftabahmed6876 ปีที่แล้ว

    Can we get some stuff about cors exploit and why it happens , why we don't report as google also uses wildcard. Also we need to know about CSRF

  • @Boolap1337
    @Boolap1337 ปีที่แล้ว

    The satisfaction when I was so confused thinking this was exactly like IDOR but the second after you explained that it pretty much is excepts BOLA is API-related :D
    Phew

  • @zakixeon5799
    @zakixeon5799 ปีที่แล้ว

    Great Présentation, Thank you! i love the format, is it possible to have more content on how to use burp, like from Zero to Hero,,, i just use it at 25% and i know there is alot you can do with burp! thanks again!

  • @SingularScript
    @SingularScript ปีที่แล้ว

    I am new to all of this. So, i am really enjoying the new videos. Is any newbie type of series comming???

  • @mikeshow69
    @mikeshow69 ปีที่แล้ว

    Thank you for this quick explanation video!

  • @hanatesfaye3678
    @hanatesfaye3678 ปีที่แล้ว

    Hey can you please do a demo on mobile pentesting ... especially the once done in flatter.

  • @animeghsarania1076
    @animeghsarania1076 ปีที่แล้ว

    please make a video on how to setup postman with certificates to test on websites not on labs

  • @primenumberbuster404
    @primenumberbuster404 ปีที่แล้ว

    Hey!!! DEFCON 31 will be lit🔥🔥

  • @moneylemour1771
    @moneylemour1771 ปีที่แล้ว

    Good

  • @peternavarroiii3944
    @peternavarroiii3944 ปีที่แล้ว

    Interesting stuff, thanks for the content.

  • @novumconsilium7498
    @novumconsilium7498 ปีที่แล้ว

    TOP , we in Belgium like you guys

  • @DEADCODE_
    @DEADCODE_ ปีที่แล้ว

    Yeah it's Idor