Get a Pentest and security assessment of your IT network.

News

Insecure Direct Object Reference Prevention

Insecure Direct Object Reference Prevention Cheat Sheet. The most common example of IDOR is referenced in element A4 of the OWASP Top 10 in the 2013 edition. An attacker can build a collection of valid ID from EMP-00000 to EMP-99999. The proposal use a hash to replace the direct identifier. This hash is salted with a value defined at application level in order support topology in which the application is deployed in multi-instances mode (case for production).”]

Source: https://cheatsheetseries.owasp.org/cheatsheets/Insecure_Direct_Object_Reference_Prevention_Cheat_Sheet.html

Related posts
News

Ashley Madison 2.0 Hackers Leak 20GB Data Dump, Including CEO's Emails

News

Art of Twitter account hacking

News

Take note, next week update Adobe Reader and Acrobat to fix critical flaws

News

Linux bug leaves 1.4 billion Android users vulnerable to hijacking attacks