Time
1 hour 27 minutes
Difficulty
Intermediate
CEU/CPE
2

Video Transcription

00:00
Hello. My name's I happily welcome to the overview off Secure code in
00:05
Broken. That says control vulnerability is actually the number five on the list off the top there no obstacle in our abilities off 2000 and 17 minutes, you're gonna be looking at the intro. The causes scenario impact prevention on some questions Now, in broken assets on true, they are actually authenticate. Edges us
00:22
this authentic it that gives us a legitimate use us almost all the time. Yeah, Inside us of an organization.
00:28
There are access to a couple of files, a couple of days, a couple of information. Now who says that they don't have access to more things that are supposed to have access to That is a restrictions come now if their restrictions on this absence
00:43
at these restrictions properly enforced, does what we mean by broken access control, vulnerability it or not,
00:49
if there are no restrictions idea not properly enforced on those access. Now some of these so called users exploits this close to access or not arrest functionality or not arrest user sensitive P. I hang unauthorized user sensitive information that they're not supposed to have access to.
01:08
They have access tree. They don't just have access to the Also go to the
01:11
extent or modifying it sometime this to information from day then. Apart from that, we can even go as long US no, guinea on changing the access right or such individuals, they are access to the mean privilege in that case. So what causes off the broken access control? One of them is the week Access control.
01:32
We cancers control much systems from the father.
01:34
The access control has not been coded win or it has not been well implemented. That's actually problems. So in that case, we say it is very weak on you can actually needs work or broken access. Untrue vulnerability on all I want is ineffective function are tested by application. Testa.
01:51
Most of this application test has don't have coding background. So the landing capability or testing for something functionalities
01:57
in some of this application. So we say that testing method is ineffective.
02:02
They're not going. There is lack of ultimate a detection system for week access is now the lot. Then use automation shows like this sauce, which is Patrick application security testing. So all the dust, which is dynamic application security testing. So now this close can elated that the absence of access control
02:21
they are not dead if this access control is functional and that is why I perform on our testing.
02:25
Monotonous in is just a way to go in this case because it's about you. So actually check if access control is absent and at the same time he too obvious a check if assess control is actually functional because this is human. You want testing, so you test for those things on. Those are the simple causes
02:45
off Broken access, control week, access, control, ineffective function are testing or lack of it to me, then
02:51
detection system for week abscesses. I went to take your troops of scenarios. In this case, one is what we call the forced Brasi Wants to be able to see that you are you are You can access something pages off on application without being able to looking. Then the other one is on very five assets.
03:07
I want to see if you can actually about says to where you're not supposed to have access to. So here
03:12
I went to log into a nap Vacation week, love, which I built. So this is a one
03:19
way I wantto got actually signing my first time here. So I love unlucky in us they want. So here is the dashboard on go streets, broken access control. So let's how it's on Very fine accents. Now let me see if I can not getting access so other people's information without being very fight.
03:38
Now here,
03:39
this is the one on you. You check you. You'll find out that these euro the username dollars used to lookin Wascana fascinated with the jury. And that is what is used to fetch our people's information while committing a passports. This wants to try something some funny things. Now he checks these enemies for anyone. Yes, that's possible about each
04:00
here
04:01
this for everything because I've locked in with anyone
04:05
authenticate that Jews are. Now I want to be able to see if I can check the on additives off corps workers in the same organization with me. So I don't get that visa, But I mean, Miley shows shoes off this application within the organization among his cider. So here we go to this, if I can get into,
04:25
so just do it to now Let's think you got that against the dishes. It to this is this parcel. This is each nest give you cards is credit card until she can't see that's actually loved enough, you want. But because my access was not very fight, I can't see other people's detail. So I'm going to do three.
04:44
Because I know the eyes are names. We all walk in the same company. So here, because it is a tree, does the password and as the god of all its information, credit capping off a tree. And I don't do that. So he filed the user means I know so I can actually best with Hollow Boston's on. Fortunately for me, I'm able to get
05:01
those snippets of information I can. Still these I can
05:05
increase the our access, right? I can't even downplayed them on Dewey who love that. But what's How do you control this particle? Are kind of broken access, untrue vulnerability. So this is what I call very fight access control. Now here,
05:21
I'm going to look. It is because I'm not the nasty one. Now I want to see if I'll be able to
05:27
check in juice information in biscuits Let's see how good you see after I needed to get through now is telling me that I'm definitely on a car. So this one is very five. So for code as you need to let out, some very fine you need to be able to verify or that people's details before you actually open up
05:46
something pages for them. So, like, yeah, it has been very fine. So you're saying that I'm definitely on aka
05:51
National drugging if I am not so in this case is going to throw me out of it, which is the right thing to do. So that's anyone ongoing blogging about us, the one they want 23
06:02
So I sign in again now in Pakistan. It was going to show you the port naturally threw me out off that particle A peek at that time. So that says, this is the pitch itself, which you call, um, the
06:21
which we call yet broken access.
06:26
Very fight so you can't see it. Us is JavaScript legendary file, which we call the very fine upset. Don't g et. So let's take a look at it. Very fine access. The J is to see the could actually trust me out so that please now. Hey, it checks. This is the peaks.
06:45
It begs
06:46
the user name from the euro on dhe. It compares it with what is already in decision. Because if you log in Yuri's attitudes to be saved in the session So I'm comparing the treats. What, is it desirable in this case? So, Waas,
07:00
I am the person it brings on my details. But once I'm not, the person is simply are lots that are definitely looking even notes that you, Keisha, don't simply replaces on excellent varsity in the experts. So that's is our that actually works. Now let's take a look at forced browsing
07:18
in foster. Brother wants to be able to see if,
07:20
after knowing the particle are, um you are like this now I have this part supply you are. I want to see if I can access this speed without looking into I'm going to put out there. So let's see how you go.
07:34
You can see is saying that is forced browsing and night is not allowed in. So that's just are you doing now, which could actually l speeds. They kill that
07:45
they end up. He does, um, forced browsing. Now, if you look at since we have a data, just so I've just been speaking to God and that the jsp here to see you can see this is the code it checks. If my user is no or if it is empty or if it is on to find dummies are not looking,
08:03
he just simply trust me out of it. So you can simply pull such script
08:07
inside the body off the old beach. In this case, an atrocity. There are several ways off. They got even more advanced way of dreaming. This is just one of the ways I've just shown you here. So basically, we've taken a new cats forced drowsy on a verified accents. So what are the impacts off access control? One is
08:26
on all the rest. Access to the system. Just like so. I had another rest access to other people's data to the system. So no one is.
08:33
Deeds are left now. I can actually still the editor for what house. And it'll compromise like I even change the data in that kid's now once. How do you prevent this? Broken access control? One is about from using automated testing. Always engage
08:48
application. They started off good in Bagram, then I don't want his always denying all from reception. Then Little grants them.
08:56
The specific writes that he needs to do their work except for public resources. Then try to reuse access control once you have implemented its wants for using are going to petition here and there.
09:07
The last one day is disabled. I entry listing tried to disable the introduced in different ways off green it, like on glass free summer
09:16
you will you do? It is different from the way we don't know that someone so you can actually disable the entry leased it from the application or even from this summer so that we don't have access to all the files in the application on toy.
09:31
So let's take a look at some of this quiz questions, which are This is that lip I've broken access come true. One is integrity. Confidence shots conserve its availability off course, the outsize confidentiality. Because
09:43
waas, you carry out the Brooklyn access, exploit the fasting, you see these people's information. Then, as we can talk about it, I've been accessed the way I suppose our access to his confidentiality and I don't wanna switch off. This is an example of Brooklyn assets
10:00
SQL injection. Forceful bras in black aren't forced browsing here. The Assad are forceful browsing on forced brother Fossil brother is the seven are supposed to present, so don't get confused. In that case,
10:11
sorry we've looked at Brokenness has come true as poor restrictions on access is Then we've talked about it cause us ineffective testing. Then we looked at so scenarios one of which was forced browsing, then on very finances. Then we've looked at it in parts one of which waas the access to other people's Pia
10:31
I'm out. You've been prevented by my northwest in
10:33
so love has a way of going about it. The they don't don't think off preventing it. It is what you know about that you think are preventing. So before I cast for a cast, you can keep trying. But I can assure you that all access so your exploits will be tonight

Up Next

Secure Coding Fundamentals

In Secure Coding Fundamentals, Ayokunle Olaniyi takes you through the best coding practices, which ensures that the application developed as a result stick to the CIA triad and are not riddled by the OWASP top 10. Various aspects of code security and risk assesments across the OWASP top 10 are discussed along with the preventive measures.

Instructed By

Instructor Profile Image
Ayokunle Olaniyi
Instructor