Assessing Authorization Checks // Insecure Direct Object Reference (IDOR) // OWASP Mutillidae
Bhavin Patel
Testing for Insecure Direct Object Reference (IDOR)
Allowing unauthorized direct access to files or resources on a system based on user-supplied input is known as Insecure Direct Object Reference (IDOR). This vulnerability allows the bypassing of authorization checks placed on such files or resources. IDOR is a result of unchecked user supplied input to retrieve an object without performing authorization checks in the application code.
Web App Penetration Testing: https://www.youtube.com/watch?v=XCq2Mfv60UA&list=PL8PnAf11sThVqeqptNmF9vSZ9tRvaeQtX
Any questions let me know. Thanks for stopping by and please don't forget to subscribe. Cheers
I hope you enjoy/enjoyed the video.
If you have any questions or suggestions feel free to ask them in the comments section or on my social media pages.
Thank you for checking out this video and my channel, sharing is caring so please share, comment, like and don't forget to subscribe
📱Social Media📱 & ❓Info❓
Follow me on the following platforms: YouTube Subscription Link: https://www.youtube.com/cyberbruharmy?sub_confirmation=1 Facebook: https://www.facebook.com/groups/3504201579595093/?ref=share Twitter: https://twitter.com/patelbhavin_ Instagram: https://www.instagram.com/pbhawinr/ Discord: https://discord.com/invite/8Uz7ArN ... https://www.youtube.com/watch?v=SlsEYuMNHN8
20285225 Bytes