Revisiting Insecure Direct Object Reference (IDOR)
ATT&CK techniques detected
T1190Exploit Public-Facing Application
76%
"revisiting insecure direct object reference ( idor ) revisiting insecure direct object reference ( idor ) the new year has begun, and as a penetration tester at black hills information security, one thing really struck me as i reflected on 2023 : a concerningly large number of we…"
Which technique(s) should be tagged here? Pick zero or more — leaving blank just records that the original was wrong.
No matches for .
Loading techniques…
T1071.001Web Protocols
33%
"are a number of spots in the http request where these identifiers may be, such as a url query strings, http post parameters, or even in cookie values. if the web application makes an http post request to retrieve the name, email address, and phone number of the current user with …"
Which technique(s) should be tagged here? Pick zero or more — leaving blank just records that the original was wrong.
No matches for .
Loading techniques…
Summary

The new year has begun, and as a penetration tester at Black Hills Information Security, one thing really struck me as I reflected on 2023: a concerningly large number of […]
The post Revisiting Insecure Direct Object Reference (IDOR) appeared first on Black Hills Information Security, Inc..