Intermediate
Web Exploitation
Access Control, IDOR & SSRF
Deep dive into broken access control: IDOR enumeration, privilege escalation, JWT attacks, business logic flaws, and Server-Side Request Forgery with cloud metadata exploitation.
Lessons
- Broken Access Control & IDOR (enroll to unlock)
- Broken Authentication & JWT Attacks (enroll to unlock)
- IDOR at Scale & Business Logic Flaws (enroll to unlock)
- Server-Side Request Forgery (SSRF) (enroll to unlock)
Course Info
Difficulty: Intermediate
Category: Web Exploitation
Lessons: 4
Tests: 4