InfoSec Write-ups

A collection of write-ups from the best hackers in the world on topics ranging from bug bounties and CTFs to vulnhub machines, hardware challenges and real life encounters. Subscribe to our weekly newsletter for the coolest infosec updates: https://weekly.infosecwriteups.com/

Follow publication

Testing and Bypassing Technique for IDOR

Vignesh
InfoSec Write-ups
Published in
5 min readJun 23, 2023

What is IDOR?

Two Types of IDOR

Testing for IDOR

Lab: Insecure direct object references

From Lab Summary:

Leaked ID in Profile/Private Message

GET /messages?conversation_id=849849899938664746276776762767462474274

GET /messages?user_id=2763

Blind IDOR

Changing the Request Method

DELETE example.com/uploads/user1236-01.jpeg
GET /get_receipt?receipt_id=2983

Chaining the bug with other

Automate of IDOR

Free

Distraction-free reading. No ads.

Organize your knowledge with lists and highlights.

Tell your story. Find your audience.

Membership

Read member-only stories

Support writers you read most

Earn money for your writing

Listen to audio narrations

Read offline with the Medium app

Published in InfoSec Write-ups

A collection of write-ups from the best hackers in the world on topics ranging from bug bounties and CTFs to vulnhub machines, hardware challenges and real life encounters. Subscribe to our weekly newsletter for the coolest infosec updates: https://weekly.infosecwriteups.com/

Written by Vignesh

Hi, I'm Vignesh just call me Vicky. I'm a cybersecurity Researcher who was more interested in this cybersecurity field basically I'm a Offsec Student.

No responses yet

Write a response