Back to Browse

Access Control Failures: How Attackers Grab Other Users’ Data

Mar 17, 2025
8:04

In this video, we dive deep into broken access controls, specifically path traversals exploits on websites. Learn how attackers can target the URL to gain access to sensitive data from the server by using the Damn Vulnerable Web Application (DVWA) tool. This vulnerability is identified on the OWASP Top 10 as: A01:2021 - Broken Access Control The weaknesses identified during this test is "Bypassing access control checks by modifying the URL (parameter tampering or force browsing), internal application state, or the HTML page, or by using an attack tool modifying API requests." Make sure to check out https://Pentest.TV for additional resources, including free ethical hacking courses. Happy Hacking!

Download

0 formats

No download links available.

Access Control Failures: How Attackers Grab Other Users’ Data | NatokHD