Module 7 — Authentication, Authorization, and Application Security
Lesson 1 — Access and Request Vulnerabilities
Unit 4 — Common Backend Vulnerabilities
Not finished yet
Topics
- Recognize broken access control
- Recognize IDOR/BOLA vulnerabilities
- Recognize SSRF risk patterns
- Recognize command injection risk patterns
- Recognize path traversal risk patterns