Cyber Security / Ethical Hacking
Ctrlk
  • Prologue
  • CTF/OSCP Prep
    • Fundamentals
    • Information Gathering
    • Enumeration
    • Exploitation
  • Binary Exploitation / Exploit Development
    • Useful tools and techniques for Binary Exploitation
    • Shellcoders Handbook
  • TryHackMe
    • Linux Fundamentals
    • Advent of Cyber
    • Web Application Security
    • Linux Privesc Playground
    • Intro to x86-64
    • Ninja Skills
    • CC: Radare2
    • Reversing ELF
    • Intro to Python
    • ToolsRus
  • Programming
    • Python
    • Golang
  • Protostar
    • Stack 0
    • Stack 1
    • Stack 2
  • Web App Pentesting
    • Recon
    • Authentication (Portswigger Academy)
    • Broken Acess Controls
      • Insecure direct object references (IDOR)
  • HackTheBox
    • Active
Powered by GitBook
On this page

Was this helpful?

  1. Web App Pentesting

Broken Acess Controls

Insecure direct object references (IDOR)
PreviousVulnerabilities in other authentication mechanismsNextInsecure direct object references (IDOR)

Last updated 5 years ago

Was this helpful?