Business Logic Vulnerabilities - Lab #7 Weak isolation on dual-use endpoint | Long Version

  Рет қаралды 782

Rana Khalil

Rana Khalil

Күн бұрын

Пікірлер: 4
@RanaKhalil101
@RanaKhalil101 7 ай бұрын
🚀Ready to level up your web security game? Unlock 15 courses and over 50 hours of content with our All-Access Membership for just $1/day: academy.ranakhalil.com/p/all-access-membership 🌟
@MustafaGains
@MustafaGains 7 ай бұрын
Thx! 🙏 excuse me Rana i have a small question , Is it a vulnerability like if we created 2 accounts A and B and swapped only the (sessionsID) of account B to account A and send the request from account A which gonna return 200 OK and let us access account B ? . While keeps every things else as its such CSRF,accountID,middleware without changing them. Lookin patiently for your response.
@RanaKhalil101
@RanaKhalil101 7 ай бұрын
No that's not a vulnerability. The session id is what authenticates and authorizes the user and so if you swap it, it should present you with the user that is tied to that session id.
@nishantdalvi9470
@nishantdalvi9470 6 ай бұрын
@@RanaKhalil101 Can we see scenarios similar to the one which is been portrayed within this lab in real world web applications ? Waiting for your reply patiently
Vim Tips I Wish I Knew Earlier
23:00
Sebastian Daschner
Рет қаралды 79 М.
FOREVER BUNNY
00:14
Natan por Aí
Рет қаралды 29 МЛН
Don't underestimate anyone
00:47
奇軒Tricking
Рет қаралды 18 МЛН
The Singing Challenge #joker #Harriet Quinn
00:35
佐助与鸣人
Рет қаралды 47 МЛН
Interviewing the best language learner ever (Part 2)
22:22
Days and Words
Рет қаралды 156
What are Digital Signatures? - Computerphile
10:17
Computerphile
Рет қаралды 345 М.