This lab presents a challenge in the Shadow Bank cyber range that exploits a Broken Access Control vulnerability, caused in part by missing or broken input validation and a business logic flaw. According to OWASP.org “Access control enforces policy such that users cannot act outside of their intended permissions. Failures typically lead to unauthorized information disclosure, modification or destruction of all data, or performing a business function outside of the limits of the user.
On successful completion of this course, learners should have the knowledge and skills required to:
- Understand how adversaries can exploit failures in access control mechanisms by penetrating the application and acting outside of the intended permissions for the logged-in user