Hunting Insecure Direct Object References (IDORs)

HUNTING INSECURE DIRECT OBJECT REFENCES (IDORs) This blog post was written by Rodney Kariuki. Introduction Insecure Direct Object Reference (IDOR) is a type of access control vulnerability that arises when the references to data objects (like a file or a database entry) are predictable, and the application uses user-supplied input [...]

By |2021-03-22T19:30:48+03:00March 22nd, 2021|Offensive Security, Penetration Testing, Red Teaming|

Windows Privilege Escalation

WINDOWS PRIVILEGE ESCALATION This blog post was written by Varun Gupta. Introduction Privilege escalation happens when a malicious user exploits a vulnerability in an application or operating system to gain elevated access to resources that should normally be unavailable to that user. The attacker can then use the newly gained [...]

By |2021-03-15T08:24:36+03:00March 15th, 2021|Offensive Security, Penetration Testing, Red Teaming|
Go to Top