Главная
Study mode:
on
1
Intro
2
Module Trainer
3
Module Outline
4
Module Reading
5
Introduction to Access Control bugs
6
Simple numeric IDOR
7
Bugcrowd VRT Rating
8
GUID based IDOR (cont.)
9
Hash based IDOR
10
Request methods
11
Local File Inclusion and Path Traversal
12
Static pages & "forceful browsing"
13
Static files
14
Direct function calling
15
Parameter Manipulation
16
Logic Flaws
17
Auxiliary Tips
18
Likely parameters/keyword to check for IDOR
19
COTS, OSS, and paywalled applications
20
Create a function matrix for MFLAC
21
Burp Intruder
22
References
Description:
Learn about broken access control testing in this comprehensive video from Bugcrowd University. Explore various types of access control vulnerabilities, including Insecure Direct Object References (IDOR), Local File Inclusion, Path Traversal, and logic flaws. Discover techniques for identifying and exploiting these vulnerabilities, such as parameter manipulation and forceful browsing. Gain insights into using tools like Burp Intruder for testing, and understand how to rate vulnerabilities using the Bugcrowd VRT. Delve into specific topics like GUID-based and hash-based IDORs, request methods, and auxiliary tips for effective testing. Perfect for aspiring white hat hackers and bug bounty hunters looking to enhance their skills in identifying and reporting access control issues.

Bugcrowd University - Broken Access Control Testing

Bugcrowd
Add to list