Web Security

Broken Access Control

Risk: Users can access unauthorized functionality or data. Includes privilege escalation, unauthorized resource access, and bypassing access controls.

WEB-ACCESS-01Module ID
Hands-onLab Type
IntermediateLevel

Overview

Discover common authorization flaws, test IDORs and missing access checks, and implement strong, centralized authorization.

Learning Outcomes

  • Identify IDOR and path traversal authorization gaps
  • Distinguish horizontal vs vertical privilege escalation
  • Apply role- and attribute-based access control
  • Enforce server-side checks consistently
  • Design deny-by-default access patterns

Hands-on Labs

Exploit IDORs in a safe app, add missing checks, and validate fixes with tests and tooling.

Hardening

Centralize authorization, minimize object references, and log access denials with context.