Activity #1518
Updated by Bhaveeni Narottam 14 days ago
Training video assigned for 2 week training track: https://youtu.be/YYe0FdfdgDU?si=PwhgdNPlr0N0waGf
Covered the following vulnerabilities:
1. Broken Object Level Authorization (BOLA)
2. Broken Authentication
3. Broken Object Property Level Authorization
4. Unrestricted Resource Consumption
5. Broken Function Level Authorization
6. Unrestricted Access to Sensitive Business Flows
7. Server Side Request Forgery (SSRF)
8. Security Misconfiguration
9. Improper Inventory Management
10. Unsafe Consumption of APIs