Identify and Prevent Broken Access Control
Lesson 1 of 1
  1. 1
    In our modern era, applications are becoming increasingly more robust, dynamic, and complex. Given the increased complexity, it is only natural that vulnerabilities will find their way into our app…
  2. 2
    Before we can identify any vulnerabilities within our code, we need to obtain a proper understanding of the code. Let’s discuss the intended flow of the code, starting with the login function.
  3. 3
    Now that we understand how the code is supposed to work let’s take a look at what’s actually happening. Let’s log in and validate that the protected endpoints are protected. Let’s leverage …
  4. 4
    Our last exercise found that the validation code surrounding the account_password feature was not properly securing individual accounts. To understand why let’s dive into the validate_request and a…
  5. 5
    As mentioned, applications are becoming increasingly more robust, dynamic, and complex in our modern era. Given the increased complexity, it is only natural that vulnerabilities will find their way…

How you'll master it

Stress-test your knowledge with quizzes that help commit syntax to memory