"If a person has control over any function, it can also be used to control the computer"(week 14)
"If a person has control over any function, it can also be used to control the computer" img url: https://media.istockphoto.com/vectors/the-red-fishing-hook-is-stealing-password-on-a-laptop-vector-id1173707516?k=20&m=1173707516&s=170667a&w=0&h=XOJ7iaSoLUmupXMpm1r-PSGGEAUdAdBrzZ4-O29mvdI= Last year, Laxman Muthiyah, a security researcher, found out that it was possible for any attacker to assign themselves admin privileges for any Facebook page they desired. [1] The operation was done through Broken Access Control, which happens when access permissions are misconfigured by the attacker allowing them to gain access to functions they are not supposed to have. [2] With this access they may delete, modify, or copy, different data, files, and account information amongst other things. The opportunity of Broken Access Control to take place relies completely on how securely designed and coded the webpage or application is. In Facebook’s case, it was a flaw in th...