Introduction To OWASP Top Ten: A5 - Broken Access Control - Scored
Cyberscore

Did you know Cybrary has FREE video training? Join more than 2,500,000 IT and cyber security professionals, students, career changers, and more, growing their careers on Cybrary.

Time
30 minutes
Difficulty
Intermediate

This module for the Introduction to OWASP Top Ten Module covers A5: Broken Access Control.

Did you know Cybrary has FREE video training? Join more than 2,500,000 IT and cyber security professionals, students, career changers, and more, growing their careers on Cybrary.

Overview

CybrScore’s Introduction to OWASP Top Ten A5 Broken Access Control lab is a premium lab built for the intermediate skill level student to have hands-on practical experience in broken access control. Broken access control is listed as the fifth item on the ten most common web application security risks list, reported in the OWASP Top 10 2017 report.

CybrScore’s Introduction to OWASP Top Ten A5 Broken Access Control lab teaches how identify and exploit simple examples of evading client-side Access Control in a web application and how to identify and exploit simple examples of Insecure Direct Object References in a web application.

Upon successful completion of the CybrScore Introduction to OWASP Top Ten A5 Broken Access Control lab, students should be able to identify and exploit simple examples of evading client side Access Control in a web application, and to identify and exploit simple examples of Insecure Direct Object References in a web application. CybrScore’s Introduction to OWASP Top Ten A5 Broken Access Control lab takes approximately 1-2 hours to complete for most students.

In CybrScore’s Introduction to OWASP Top Ten A5 Broken Access Control lab, students will learn to identify and exploit simple examples of evading client side Access Control in a web application. This is a key part of the Vulnerability Assessment Analyst work role and builds the ability to identify and exploit simple examples of broken access control in a web application.

In CybrScore’s Introduction to OWASP Top Ten A5 Broken Access Control lab, students will learn to exploit simple examples of Insecure Direct Object References in a web application. This is a key part of the Vulnerability Assessment Analyst work role and builds the ability to perform successful attacks involving broken access control.

Click the launch button to open the lab.