Module 15: Insecure Direct Object Referencing
Introduction to IDOR
Static File IDOR

Sample routing
Routed URI Examples
Database Object Referencing (ID-Based) IDOR
Example IDOR for a Database Object
Exploiting IDOR in the Sandbox
Accessing the IDOR Sandbox Application
Start the VPN, the VM, and add its IP and hostname to your hosts file.
Exploiting Static File IDOR




Exploiting ID-Based IDOR




Exploiting More Complex IDOR


Gathering Erroneous Response Sizes
We got 0 because we didn't include a valid session ID.

Gathering Erroneous Response Sizes with a Session ID
Fuzzing 100,000 possible UIDs

Extra Miles
Do the labs.
Case Study: OpenEMR
Accessing The OpenEMR Case Study
Start the VPN, the VM, and add the IP/hostname to your hosts file.
Discovery of the IDOR Vulnerability










Exploiting the IDOR Vulnerability


Extra Mile
Do the lab.
PreviousModule 14: Server-side Request ForgeryNextModule 16: Assembling the Pieces: Web Application Assessment Breakdown
Last updated