YoVDO

Bugcrowd University - Broken Access Control Testing

Offered By: Bugcrowd via YouTube

Tags

Bug Bounty Courses Cybersecurity Courses Ethical Hacking Courses Insecure Direct Object References (IDOR) Courses

Course Description

Overview

Learn about broken access control testing in this comprehensive video from Bugcrowd University. Explore various types of access control vulnerabilities, including Insecure Direct Object References (IDOR), Local File Inclusion, Path Traversal, and logic flaws. Discover techniques for identifying and exploiting these vulnerabilities, such as parameter manipulation and forceful browsing. Gain insights into using tools like Burp Intruder for testing, and understand how to rate vulnerabilities using the Bugcrowd VRT. Delve into specific topics like GUID-based and hash-based IDORs, request methods, and auxiliary tips for effective testing. Perfect for aspiring white hat hackers and bug bounty hunters looking to enhance their skills in identifying and reporting access control issues.

Syllabus

Intro
Module Trainer
Module Outline
Module Reading
Introduction to Access Control bugs
Simple numeric IDOR
Bugcrowd VRT Rating
GUID based IDOR (cont.)
Hash based IDOR
Request methods
Local File Inclusion and Path Traversal
Static pages & "forceful browsing"
Static files
Direct function calling
Parameter Manipulation
Logic Flaws
Auxiliary Tips
Likely parameters/keyword to check for IDOR
COTS, OSS, and paywalled applications
Create a function matrix for MFLAC
Burp Intruder
References


Taught by

Bugcrowd

Related Courses

PHP with MySQL Essential Training: 2 Build a CMS
LinkedIn Learning
Bug Bounty
YouTube
Beginner Bug Bounty Course - Web Application Hacking
YouTube
Owning Cody's First Blog - RCE on Hacker101 and Hacking on FFH from BugBountyNotes.com - IDOR
NahamSec via YouTube
Using BurpSuite's Intruder for Bug Hunting and CTF Challenges
NahamSec via YouTube