Cyber Security / Ethical Hacking
search
Ctrlk
  • Prologue
  • CTF/OSCP Prep
    • Fundamentalschevron-right
    • Information Gatheringchevron-right
    • Enumerationchevron-right
    • Exploitationchevron-right
  • Binary Exploitation / Exploit Development
    • Useful tools and techniques for Binary Exploitation
    • Shellcoders Handbookchevron-right
  • TryHackMe
    • Linux Fundamentalschevron-right
    • Advent of Cyberchevron-right
    • Web Application Securitychevron-right
    • Linux Privesc Playground
    • Intro to x86-64
    • Ninja Skills
    • CC: Radare2
    • Reversing ELF
    • Intro to Python
    • ToolsRus
  • Programming
    • Pythonchevron-right
    • Golangchevron-right
  • Protostar
    • Stack 0
    • Stack 1
    • Stack 2
  • Web App Pentesting
    • Recon
    • Authentication (Portswigger Academy)chevron-right
    • Broken Acess Controlschevron-right
      • Insecure direct object references (IDOR)chevron-right
  • HackTheBox
    • Activechevron-right
gitbookPowered by GitBook
block-quoteOn this pagechevron-down
  1. Web App Pentesting

Broken Acess Controls

Insecure direct object references (IDOR)chevron-right
PreviousVulnerabilities in other authentication mechanismschevron-leftNextInsecure direct object references (IDOR)chevron-right

Last updated 5 years ago

Was this helpful?

Was this helpful?