If It's Broken, Fix It
Enter the world of broken access control.
StartIdentify and Prevent Broken Access Control
Lesson 1 of 1
- 1In our modern era, applications are becoming increasingly more robust, dynamic, and complex. Given the increased complexity, it is only natural that vulnerabilities will find their way into our app…
- 2Before we can identify any vulnerabilities within our code, we need to obtain a proper understanding of the code. Let’s discuss the intended flow of the code, starting with the login function.
- 3Now that we understand how the code is supposed to work let’s take a look at what’s actually happening. Let’s log in and validate that the protected endpoints are protected. Let’s leverage …
- 4Our last exercise found that the validation code surrounding the account_password feature was not properly securing individual accounts. To understand why let’s dive into the validate_request and a…
- 5As mentioned, applications are becoming increasingly more robust, dynamic, and complex in our modern era. Given the increased complexity, it is only natural that vulnerabilities will find their way…
How you'll master it
Stress-test your knowledge with quizzes that help commit syntax to memory