Secure Coding: Preventing Broken Access Control

Learn how to protect your code from access control issues. You will gain an understanding of how an attacker might find and attack those vulnerabilities before building defenses into your code.
Course info
Level
Intermediate
Updated
Apr 24, 2020
Duration
1h 57m
Table of contents
Description
Course info
Level
Intermediate
Updated
Apr 24, 2020
Duration
1h 57m
Description

Broken access controls can expose information and functionality in your service to unauthorized users and is currently one of the top vulnerabilities found in software. You need to understand those vulnerabilities in order to defend against potential attackers. In this course, Secure Coding: Preventing Broken Access Control, you will gain the ability to protect your code from access control vulnerabilities. First, you will learn to understand vulnerabilities and potential attacks against them. Next, you will discover some of the key principles associated with defensive code. Finally, you will explore how to write clean, readable, defensive code. When you are finished with this course, you will have the skills and knowledge needed to protect your code from access control vulnerabilities.

About the author
About the author

Gavin is passionate about security and has an extensive background in software development in regulated environments. He currently works in a Red Team at a FTSE 100 company.

More from the author
Getting Started with BeEF
Beginner
1h 46m
Nov 6, 2019
Section Introduction Transcripts
Section Introduction Transcripts

Course Overview
[Autogenerated] Hi, everyone. My name's Gavin Johnson Lynn on Welcome to my course. Secure according preventing broke access control. I've worked in software development for a number of years, and I'm currently an offensive security specialist, improving the security of software on the business around me. Broken access control refers to a range of software vulnerabilities, which are some of the most common vulnerabilities in software. Today. They can expose a wide variety of information on functionally to unauthorized users. Although they're often straightforward to fix in the schools, we're going to understand how a real attacker confined on attack these vulnerabilities. This lets us see how a court could be exploited in a realistic scenario armed with this information, well, then look at defenses we can apply to accord. Some of the major topics that we cover include forced browsing to find hidden functionally traversing directories for unauthorized file access. Manipulating parameters toe all the results on finding insecure direct object references. By the end of this course, you'll have some simple yet effective defenses that protect you from a range of broken access control vulnerabilities. Before beginning the course, you should have some experience with software development on guy dealing some knowledge of client server communication, such as a browser talking to a Web server or an application. Talking to a Web beast, a p I. I hope you'll join me on this journey to lend a court securely with the secure according preventing broken access control course at plural site.