Channel: LiveOverflow
Category: Education
Tags: liveoverflowauth bugsauthbug bountyversusauth vs authhow to hackexploit tutorialauthorizationlive overflowhacking tutorialwhat does it meanauth differencesbugbountyvsauthentication
Description: Authorization and Authentication can be confusing. In this video we look at their differences, and then focus on valid and invalid authorization bugs. advertisement: this video was commissioned by the Google Vulnerablity Rewards Program for their site bughunters.google.com watch all BHU videos here: youtube.com/playlist?list=PLY-vqlMAnJ9bGoI82H1BB8BE4A8H2OCA- 00:00 - Intro 00:33 - Authentication vs. Authentication 02:04 - Complex Systems with Permissions and Roles 02:42 - Example #1: Permission Complexity 04:16 - "Fixes" for Authorization Bugs 04:48 - Roles vs. Permissions 05:53 - What are Authorization Bugs? 06:52 - Example #2: Confusing Invalid Auth "Bugs" 08:22 - Summary -=[ ❤️ Support ]=- → per Video: patreon.com/join/liveoverflow → per Month: youtube.com/channel/UClcE-kVhqyiHCcjYwcpfj9w/join -=[ 🐕 Social ]=- → Twitter: twitter.com/LiveOverflow → Instagram: instagram.com/LiveOverflow → Blog: liveoverflow.com → Subreddit: reddit.com/r/LiveOverflow → Facebook: facebook.com/LiveOverflow