Overview
Syllabus
Intro
Overview
Other types of Authorization Bypass
A condition might allow ignoring a check
A condition might allow skipping a check
Detection: Typical detection approaches
Stopping the Whack-A-Mole
Starting from first principles
Predicting authorization results
Single authorization logic - Challenges
Using request signals
Using a Random Forest to predict result
Limitation of using backend signals
Relying on the server response
Caveats of using response data
Using the data
Creating bags of hashes
Learning patterns of access
Building the models
Training the models
Detecting & Blocking attacks
General notes
Questions?
Taught by
nullcon