OWASP Top 10: A5 – Broken Access Control
Resource authorization occurs after successful authentication. Resources include objects such as files folders web apps storage accounts virtual machines and so on. In this course youll learn about various resource access control models including MAC DAC and RBAC. Next youll examine how broken access control attacks occur. Youll then explore HTTP methods as well as how to set file system permissions in Windows and Linux assign permissions to code and digitally sign a PowerShell script. Lastly youll learn about identify federation how to execute broken access control attacks and how to mitigate broken access control attacks.