Cyber Security / Ethical Hacking
Ctrlk
  • Prologue
  • CTF/OSCP Prep
    • Fundamentals
    • Information Gathering
    • Enumeration
    • Exploitation
  • Binary Exploitation / Exploit Development
    • Useful tools and techniques for Binary Exploitation
    • Shellcoders Handbook
  • TryHackMe
    • Linux Fundamentals
    • Advent of Cyber
    • Web Application Security
    • Linux Privesc Playground
    • Intro to x86-64
    • Ninja Skills
    • CC: Radare2
    • Reversing ELF
    • Intro to Python
    • ToolsRus
  • Programming
    • Python
    • Golang
  • Protostar
    • Stack 0
    • Stack 1
    • Stack 2
  • Web App Pentesting
    • Recon
    • Authentication (Portswigger Academy)
    • Broken Acess Controls
      • Insecure direct object references (IDOR)
  • HackTheBox
    • Active
Powered by GitBook
On this page
  1. Web App Pentesting

Broken Acess Controls

Insecure direct object references (IDOR)
PreviousVulnerabilities in other authentication mechanismsNextInsecure direct object references (IDOR)

Last updated 5 years ago

Was this helpful?

Was this helpful?