From the course: Programming Foundations: Web Security
Unlock the full course today
Join today to access over 24,900 courses taught by industry experts.
URL manipulation and Insecure Direct Object Reference (IDOR)
From the course: Programming Foundations: Web Security
URL manipulation and Insecure Direct Object Reference (IDOR)
- A URL manipulation attack is when someone edits the URL text in the browser's location bar, in order to probe a website. URLs are easily changed, and they often follow a pattern which makes them inviting targets. Manipulation may be performed by innocent users who are just curious, or by hackers who're probing for vulnerabilities. Editing a URL can reveal private information or allow users to perform actions which should be restricted. Manipulating a URL may reveal a private webpage. The public website may not have a link to that page, or the page may be only accessible under certain conditions. For example, adding "preview=true" to a URL might show an unpublished version of the page. URLs may correspond to a set of files and directories. Changing the URL can help to map that structure. Values in a database can also be mapped. If a page displays a person's contact information, when the URL contains an ID of 27, then an…
Contents
-
-
-
-
-
- (Locked) Types of credential attacks4m 55s
- (Locked) Strong passwords4m 1s
- (Locked) URL manipulation and Insecure Direct Object Reference (IDOR)4m 43s
- (Locked) SQL injection6m 16s
- (Locked) Cross-Site Scripting (XSS)6m 15s
- (Locked) Cross-Site Request Forgery (CSRF)4m 21s
- (Locked) Cross-Site Request protections3m 38s
- (Locked) Cookie visibility and theft4m 37s
- (Locked) Session hijacking5m 8s
- (Locked) Session fixation3m 18s
- (Locked) Remote system execution2m 8s
- (Locked) File upload abuse2m 59s
- (Locked) Denial of service4m 55s
- (Locked)
-