返回介绍

Finding Your First IDOR!

发布于 2024-10-11 20:33:58 字数 1695 浏览 0 评论 0 收藏 0

Now that you know what IDORs are, how to bypass IDOR protection, and how to escalate IDORs, you’re ready to look for your first one! Hop on a bug bounty program and follow the steps discussed in this chapter:

既然你知道了 IDOR 是什么,如何绕过 IDOR 保护,以及如何升级 IDOR,你就已经准备好去寻找你的第一个 IDOR 了!赶快参加漏洞赏金计划,并按照本章讨论的步骤来进行吧!

  1. Create two accounts for each application role and designate one as the attacker account and the other as the victim account.
  2. Discover features in the application that might lead to IDORs. Pay attention to features that return sensitive information or modify user data.
  3. Revisit the features you discovered in step 2. With a proxy, intercept your browser traffic while you browse through the sensitive functionalities.
  4. With a proxy, intercept each sensitive request and switch out the IDs that you see in the requests. If switching out IDs grants you access to other users’ information or lets you change their data, you might have found an IDOR.
  5. Don’t despair if the application seems to be immune to IDORs. Use this opportunity to try a protection-bypass technique! If the application uses an encoded, hashed, or randomized ID, you can try decoding or predicting the IDs. You can also try supplying the application with an ID when it does not ask for one. Finally, sometimes changing the request method type or file type makes all the difference.
  6. Monitor for information leaks in export files, email, and text alerts. An IDOR now might lead to an info leak in the future.
  7. Draft your first IDOR report!

如果你对这篇内容有疑问,欢迎到本站社区发帖提问 参与讨论,获取更多帮助,或者扫码二维码加入 Web 技术交流群。

扫码二维码加入Web技术交流群

发布评论

需要 登录 才能够评论, 你可以免费 注册 一个本站的账号。
列表为空,暂无数据
    我们使用 Cookies 和其他技术来定制您的体验包括您的登录状态等。通过阅读我们的 隐私政策 了解更多相关信息。 单击 接受 或继续使用网站,即表示您同意使用 Cookies 和您的相关数据。
    原文