Time
9 hours 31 minutes
Difficulty
Intermediate
CEU/CPE
10

Video Description

This brief lesson introduces participants to the agenda of this module which will cover: Definition, Sample Code and Case study Demos: IDOR w/ files, IDOR with URLs, both show mitigation with tokenization Mitigations, countermeasures and defenses Lab and lab solutions

Video Transcription

00:04
Hello and welcome to the cyber very secure coding course my name Miss anywhere. And this is a loss top 10 for 2013 a four
00:16
insecure direct object reference now for our agenda. We are, of course, going to go through our definition for insecure, direct object reference. We're also going to take a look at some of the attacks that are possible when this flaw is present.
00:35
We'll also look at a case study
00:37
and then we'll have two demos, one that shows indirect object reference in regards to working with files
00:46
and then another in regards to working with you R l's. Now I will show token ization as a mitigation for both of these. In the demo,
00:57
we're gonna follow that up with our defense is countermeasures in mitigation section and then wrap up the module with our lab in lab solution.

Up Next

Secure Coding

In the Secure Coding training course, Sunny Wear will show you how secure coding is important when it comes to lowering risk and vulnerabilities. Learn about XSS, Direct Object Reference, Data Exposure, Buffer Overflows, & Resource Management.

Instructed By

Instructor Profile Image
Sunny Wear
Instructor