Leunam's PortSwigger
search
⌘Ctrlk
Leunam's PortSwigger
  • 01 SQL Injection
  • 02 Cross-site scripting
  • 03 CSRF
  • 04 Clickjacking
  • 06 CORS
  • 10 OS Comand Injection
  • 12 Path traversal
  • 13 Access Control Vulnerability
    • 01 Lab: Unprotected admin functionality
    • 03 Lab: User role controlled by request parameter
    • 04 Lab User role can be modified in user profile 17efab5460ec808c8da6e67d210bf5a2
    • 05 Lab: User ID controlled by request parameter
    • 07 Lab: User ID controlled by request parameter with data leakage in redirect
    • 09 Lab: Insecure direct object references
  • 14 Authentication
  • 15 WebSockets
  • 16 Web cache deception
  • 20 HTTP Host header attacks
  • 22 File Upload vulnerabilities
  • 28 NoSQL Injection
  • 29 API Testing
gitbookPowered by GitBook
block-quoteOn this pagechevron-down

13 Access Control Vulnerability

01 Lab: Unprotected admin functionalitychevron-right03 Lab: User role controlled by request parameterchevron-right04 Lab User role can be modified in user profile 17efab5460ec808c8da6e67d210bf5a2chevron-right05 Lab: User ID controlled by request parameterchevron-right07 Lab: User ID controlled by request parameter with data leakage in redirectchevron-right09 Lab: Insecure direct object referenceschevron-right
Previous01 Lab: File path traversal, simple casechevron-leftNext01 Lab: Unprotected admin functionalitychevron-right

Last updated 1 year ago