Broken Access Control Slides

You might also like

Download as pdf or txt
Download as pdf or txt
You are on page 1of 16

Broken Access Control

Broken Access Control

● Access or modify information beyond limits.

→ Access or modify user info without logging in.


→ Access or modify info that belongs to another user.
target.com target.com

James Bond John Wick


james@bing.com jhn@gmail.com
France Ireland
Broken Access Control
IDOR
Broken Access Control
IDOR
● Insecure Direct Object Reference.

→ Objects are accessed directly based on user input.


Broken Access Control
IDOR
● Insecure Direct Object Reference.

→ Objects are accessed directly based on user input.


Docs.

images.

Database records.
target.com?id=1 target.com?id=2

James Bond John Wick


james@bing.com jhn@gmail.com
France Ireland
target.com?id=1

James Bond
james@bing.com
France

/imgs/james.jpg
target.com?id=1 target.com/imgs/james.jpg

James Bond
james@bing.com
France

/imgs/james.jpg
GET /admin HTTP/2.0
Host: webserver.com
Cookie: session=c4m
………
Connection: close

Target
Web Server
TRACE /admin HTTP/2.0
Host: webserver.com
Cookie: session=c4m
………
Connection: close

Target
Web Server
TRACE /admin HTTP/2.0
Host: webserver.com
Cookie: session=c4m
………
Connection: close

Target
Web Server
TRACE /admin HTTP/2.0
Host: webserver.com
Cookie: session=c4m
………
Extra Headers
TRACE /admin HTTP/2.0 Connection: close
Host: webserver.com
Cookie: session=c4m
………
Proxy
Connection: close

Target
Web Server
TRACE /admin HTTP/2.0
Host: webserver.com
Cookie: session=c4m
………
Extra Headers
Connection: close

Target
Web Server
Broken Access Control

● Access or modify information beyond limits.


target.com?id=1 target.com?id=2

James Bond John Wick


james@bing.com jhn@gmail.com
France Ireland

You might also like