Part 1 Intro

Video Activity

This brief lesson introduces participants to the agenda of this module which will cover: Definition, Sample Code and Case study Demos: IDOR w/ files, IDOR with URLs, both show mitigation with tokenization Mitigations, countermeasures and defenses Lab and lab solutions

Join over 3 million cybersecurity professionals advancing their career
Sign up with
Required fields are marked with an *
or

Already have an account? Sign In »

Time
9 hours 31 minutes
Difficulty
Intermediate
Video Description

This brief lesson introduces participants to the agenda of this module which will cover: Definition, Sample Code and Case study Demos: IDOR w/ files, IDOR with URLs, both show mitigation with tokenization Mitigations, countermeasures and defenses Lab and lab solutions

Video Transcription
00:04
Hello and welcome to the cyber very secure coding course my name Miss anywhere. And this is a loss top 10 for 2013 a four
00:16
insecure direct object reference now for our agenda. We are, of course, going to go through our definition for insecure, direct object reference. We're also going to take a look at some of the attacks that are possible when this flaw is present.
00:35
We'll also look at a case study
00:37
and then we'll have two demos, one that shows indirect object reference in regards to working with files
00:46
and then another in regards to working with you R l's. Now I will show token ization as a mitigation for both of these. In the demo,
00:57
we're gonna follow that up with our defense is countermeasures in mitigation section and then wrap up the module with our lab in lab solution.
Up Next