- Introduction 3
- Lecture1.103 min
- Lecture1.2
- Lecture1.305 min
- Information Disclosure vulnerabilities 8
- Lecture2.1
- Lecture2.209 min
- Lecture2.308 min
- Lecture2.408 min
- Lecture2.508 min
- Lecture2.606 min
- Lecture2.707 min
- Lecture2.810 min
- Broken Access Control Vulnerabilities 6
- Lecture3.1
- Lecture3.2
- Lecture3.307 min
- Lecture3.409 min
- Lecture3.510 min
- Lecture3.608 min
- Path / Directory Traversal 7
- Lecture4.109 min
- Lecture4.205 min
- Lecture4.304 min
- Lecture4.404 min
- Lecture4.504 min
- Lecture4.606 min
- Lecture4.709 min
- CSRF - Cross-Site Request Forgery 1
- Lecture5.109 min
- OAUTH 2.0 Vulnerabilities 4
- Lecture6.1
- Lecture6.210 min
- Lecture6.312 min
- Lecture6.413 min
- Injection Vulnerabilities 1
- Lecture7.1
- OS Command Injection 4
- Lecture8.108 min
- Lecture8.209 min
- Lecture8.308 min
- Lecture8.405 min
- XSS - Cross Site Scripting 3
- Lecture9.104 min
- Lecture9.205 min
- Lecture9.305 min
- DOM XSS Vulnerabilities 6
- Lecture10.105 min
- Lecture10.206 min
- Lecture10.306 min
- Lecture10.406 min
- Lecture10.504 min
- Lecture10.604 min
- XSS - Bypassing Security 5
- Lecture11.106 min
- Lecture11.2
- Lecture11.310 min
- Lecture11.407 min
- Lecture11.509 min
- Bypassing Content Security Policy (CSP) 2
- Lecture12.106 min
- Lecture12.208 min
- SQL Injection Vulnerabilities 5
- Lecture13.107 min
- Lecture13.207 min
- Lecture13.305 min
- Lecture13.408 min
- Lecture13.507 min
- Blind SQL Injections 4
- Lecture14.106 min
- Lecture14.210 min
- Lecture14.308 min
- Lecture14.408 min
- Time-Based Blind SQL Injection 3
- Lecture15.108 min
- Lecture15.211 min
- Lecture15.3
- SSRF (Server-Side Request Forgery) 4
- Lecture16.1
- Lecture16.207 min
- Lecture16.305 min
- Lecture16.406 min
- SSRF - Advanced Exploitation 2
- Lecture17.106 min
- Lecture17.208 min
- SSRF - Bypassing Security 3
- Lecture18.108 min
- Lecture18.210 min
- Lecture18.307 min
- Blind SSRF Vulnerabilities 4
- Lecture19.1
- Lecture19.206 min
- Lecture19.308 min
- Lecture19.408 min
- XXE (XML External Entity) Injection 4
- Lecture20.1
- Lecture20.203 min
- Lecture20.309 min
- Lecture20.407 min
- 2 Hour Live Bug Hunting ! 14
- Lecture21.1
- Lecture21.209 min
- Lecture21.307 min
- Lecture21.409 min
- Lecture21.509 min
- Lecture21.606 min
- Lecture21.706 min
- Lecture21.812 min
- Lecture21.904 min
- Lecture21.1004 min
- Lecture21.1109 min
- Lecture21.1211 min
- Lecture21.1308 min
- Lecture21.1407 min
- Participating in Bug Bounty Programs 3
- Lecture22.110 min
- Lecture22.206 min
- Lecture22.308 min
- Bonus Section 1
- Lecture23.103 min
Introduction to Broken Access Control Vulnerabilities
Broken Access Control are the most common security threats according to OWASP top 10. This lecture introduces you to these vulnerabilities and gives you a brief of what you’ll learn in this section.