InfoSec Write-ups

A collection of write-ups from the best hackers in the world on topics ranging from bug bounties and CTFs to vulnhub machines, hardware challenges and real life encounters. Subscribe to our weekly newsletter for the coolest infosec updates: https://weekly.infosecwriteups.com/

Follow publication

Member-only story

Leveraging Burp Suite extension for finding IDOR(Insecure Direct Object Reference).

Dhanush
InfoSec Write-ups
Published in
4 min readJun 26, 2021

IDOR is one of the common vulnerabilities found in bug bounty websites. Let's see how to easily catch them.

Autorize Extension in action

What is IODR?

If you are not familiar with IDOR, then here is a quick refresher.

IDOR is a type of access control vulnerability, where the system uses the user input to access objects or resources. When a user can modify the reference that is used to access an internal object/resource that is restricted to that user, IDOR arises.

Let’s me put it in simple words with an example.

Let’s say that a school system uses a student’s unique number to retrieve personal information about the particular student. If a student provides a different unique number and retrieves info about a different student, it is an example of IDOR. Normally, the system will provide a way to limit the access for each user to his/her information. But when it doesn’t, IDOR vulnerability arises.

Autorize Extension

Extensions for finding IDOR

Let me tell you two of the most used extensions in finding IDOR.

Autorize

This free-to-use burp extension could be the most popular tool when it comes to finding IDOR. Finding IDOR is a time-consuming task as you should check every resource present on the website. You should check the resources of a high-privileged user with the cookie details of a low-privileged one. And, Autorize helps you to do just that easily.

How to use it to find IDOR?

  1. You should first feed the cookie details of a low-privileged/different user in the Autorize extension.
  2. Then roam and get different resources on the vulnerable website as a high-privileged user using your browser with burp connected.
  3. For every request you make with the high-privileged user on the site, the Autorize extension repeats the same request with the given low-privileged cookie.
  4. Finally, you can check on the Autorize…

Create an account to read the full story.

The author made this story available to Medium members only.
If you’re new to Medium, create a new account to read this story on us.

Or, continue in mobile web

Already have an account? Sign in

Published in InfoSec Write-ups

A collection of write-ups from the best hackers in the world on topics ranging from bug bounties and CTFs to vulnhub machines, hardware challenges and real life encounters. Subscribe to our weekly newsletter for the coolest infosec updates: https://weekly.infosecwriteups.com/

Written by Dhanush

Technology. Gaming. Cybersecurity.

Responses (2)

Write a response

Great

--

Thanks bro

--