This is my take on IDORs and how to understand them when you are just starting in the Web Application Penetration Testing.

Process to analyse or understand any vulnerability:

1. What it is?

2. Why it exists (basic and specific reasons)?

3. Impacts (the damage it can cause)

4. Mitigation…

Tushar Bhatia

Cyber Security Analyst | Trainer | Researcher | CTF Player | Ethical Hacker

Get the Medium app

A button that says 'Download on the App Store', and if clicked it will lead you to the iOS App store
A button that says 'Get it on, Google Play', and if clicked it will lead you to the Google Play store