Тёмный

IDOR Attack | Demo 

ITPro
Подписаться 155 тыс.
Просмотров 18 тыс.
50% 1

Have you ever wanted to know how an IDOR attack works? Insecure direct object references (IDOR) are a type of access control vulnerability that arises when an application uses user-supplied input to access objects directly. Join Daniel as he shows you how an IDOR attack is performed and what it can be used for.
Looking to get into cybersecurity? Start learning today with ITProTV: go.itpro.tv/security-skills
Connect with Daniel Lowrie:
LinkedIn: / daniellowrie
Blog: blog.itpro.tv/
#idorattack #idorattackdemo #insecuredirectobjectreferences

Опубликовано:

 

5 фев 2022

Поделиться:

Ссылка:

Скачать:

Готовим ссылку...

Добавить в:

Мой плейлист
Посмотреть позже
Комментарии : 8   
@Bigchi3f
@Bigchi3f 10 месяцев назад
Most underrated cyber security channel. Great explanation and demonstration!
@CarlosDaniel_24
@CarlosDaniel_24 Год назад
Very good demonstrations!
@thisismework6413
@thisismework6413 Год назад
Well put, thank you
@webandmobiledev
@webandmobiledev 2 года назад
Great video
@darshans3259
@darshans3259 2 года назад
Love from India🇮🇳
@prassanna6521
@prassanna6521 2 года назад
How to mitigate idor attack
@zakariaabdelaziz3182
@zakariaabdelaziz3182 Год назад
Don't do business logic on the client
@HirendraTech
@HirendraTech Год назад
You shoul have demonstrated how to fix that too ;
Далее
🤯 #funny
00:20
Просмотров 2,6 млн
Insecure Direct Object Reference (IDOR) Explained
8:14
Why Your IDORs Get NA’d, Cookies Explained
20:09
Просмотров 16 тыс.
How I made 1k in a day with IDORs! (10 Tips!)
23:09
Просмотров 50 тыс.
Cybersecurity Architecture: Application Security
16:36
"Easiest" Beginner Bugs? Access Control and IDORs
31:46
HTTPS, SSL, TLS & Certificate Authority Explained
43:29
Finding Your First Bug: Manual IDOR Hunting
33:28
Просмотров 75 тыс.
Cross-Site Request Forgery (CSRF) Explained
11:59
Просмотров 17 тыс.