In this room, you're going to learn what an IDOR vulnerability is, what they look like, how to find them and a practical task exploiting a real case scenario.

Task1: What is an IDOR?

Task2: An IDOR Example

Task3: Finding IDORs in Encoded IDs

Task4: Finding IDORs in Hashed IDs

Task5: Finding IDORs in Unpredictable IDs

Task6: Where are IDORs located

Task7: A Practical IDOR Example