Question 7 of 10Pro Only
How do you test for broken access control vulnerabilities in a web application?
Sample answer preview
Broken access control is consistently ranked as the most critical web application vulnerability in the OWASP Top 10. It occurs when users can perform actions or access data outside their intended permissions.
broken access controlIDORhorizontal escalationvertical escalationauthorization testingHTTP methods