Table of Contents

IDOR Testing

Insecure Direct Object Reference: access resources belonging to other users by manipulating IDs.

Core Technique

Two-Account Testing

  1. Create Account A and Account B
  2. Discover features as Account A
  3. Capture requests with your ID
  4. Change ID to Account B's resource
  5. Send as Account A – can you read/modify Account B's data?

Bypassing IDOR Protection

High-Value IDOR Targets

Escalation

See Also