In this room, you're going to learn what an IDOR vulnerability is, what they look like, how to find them and a practical task exploiting a real case scenario.
Task1: What is an IDOR?
Task2: An IDOR Example
Task3: Finding IDORs in Encoded IDs
Task4: Finding IDORs in Hashed IDs
Task5: Finding IDORs in Unpredictable IDs
Task6: Where are IDORs located
Task7: A Practical IDOR Example