Why Your IDORs Get NA’d, Cookies Explained

Поділитися
Вставка
  • Опубліковано 14 чер 2024
  • I've contributed a lot of misunderstanding/misinformation with the IDOR 'just change the cookie' and that SUCKS because you folks are getting NAs on your bugs because of my poor explanation. In this video we fix that and I clear up how the cookie trick works in practice!
    Did you know this episode was sponsored by Intigriti?
    Sign up with my link go.intigriti.com/katie
    I'm so pleased with everyone's positive response to the Intigriti sponsorship and I'm so pleased you folks are finding bugs and even finding your first bugs! Thank you for being awesome!
    - Related Videos -
    How to Use Firefox Containers for Easy IDOR Hunting (With Demo!): • How to Use Firefox Con...
    Finding Your First Bug: Manual IDOR Hunting: • Finding Your First Bug...
    How I made 1k in a day with IDORs! (10 Tips!): • How I made 1k in a day...
    - Social Media -
    Discord: insiderphd.dev/discord
    Patreon: / insiderphd
    Twitter: / insiderphd
    Patreon Shoutouts
    Sean Doody
    Forrest Held
    Wardell Castles
    Gynvael
    Ram
    James Clee

КОМЕНТАРІ • 72

  • @mrcharlie4917
    @mrcharlie4917 Рік тому +6

    Your content is amazing. I'm a beginner to bug bounty hunting and I have learned a lot things from you. I really appreciate your content and your contribution to the community.
    Thank you Katie..

  • @isaackay5887
    @isaackay5887 3 роки тому +5

    *This is was by far **_THE BEST_** video I’ve watch on cyber security I’ve seen, thus far!*

  • @1990shahid
    @1990shahid 3 роки тому +8

    Katie you are a superstar - thank you for taking the time to make these videos. They are very helpful

    • @InsiderPhD
      @InsiderPhD  3 роки тому +2

      Glad you like them! It means a lot for me to get messages like this!

  • @kn0xxpopul129
    @kn0xxpopul129 3 роки тому +5

    It takes lots of efforts in making such content I loved it -thanks

  • @rajatdutta8365
    @rajatdutta8365 3 роки тому +1

    Thank you!! Neatly explained.

  • @varunmehta3230
    @varunmehta3230 3 роки тому +1

    Thanks a lot. Very well explained.

  • @eXfilPr4tik
    @eXfilPr4tik 3 роки тому +3

    NICELY EXPLAINED!

  • @GohansTips72
    @GohansTips72 2 роки тому

    This video really put me in interest to study more about Bug Hunting! I was all confused before haha xd

  • @danielmcpherson9062
    @danielmcpherson9062 3 роки тому

    Thank you!!! Amazing video!!! (Like always)

  • @ggmaxx66
    @ggmaxx66 2 роки тому

    thanks Katie! IDORs make more sense now. 🌊️⛱️😎

  • @Anu-vp9um
    @Anu-vp9um 3 роки тому

    Thanks , very helpful 🙏

  • @AmanGupta-ho4rh
    @AmanGupta-ho4rh 3 роки тому

    Thanks, In the video you mentioned about middlewares. I hope you will make video's on Code Review :)
    Thanks again

  • @medicineman7894
    @medicineman7894 8 місяців тому

    Please never stop posting

  • @judithmalshini5428
    @judithmalshini5428 2 роки тому

    Thank you a lot.

  • @noobhunter2986
    @noobhunter2986 3 роки тому

    Thanks for this man

  • @sanjaylekhak7719
    @sanjaylekhak7719 3 роки тому

    Informative..!!..Please also add link of related videos in the description..it would help people like me as I haven't seen that "firefox containers" video. Thanks for the video..💖

    • @InsiderPhD
      @InsiderPhD  3 роки тому +1

      I hope not! I would like a bounty!
      (Im kidding!) thank you

    • @InsiderPhD
      @InsiderPhD  3 роки тому

      I will add those videos now!

  • @akshatsinghal9231
    @akshatsinghal9231 3 роки тому

    really great knowledge

  • @barbaros8735
    @barbaros8735 3 роки тому +1

    Does it also count as IDOR if I can access objects by changing PHPSESSID in the cookies?

  • @goldengreengrass
    @goldengreengrass 10 місяців тому +1

    Hello Katie,
    First of all thank you so much for providing us such information. I've a question I was hunting on a bug bounty platform and I found a end point which is vulnerable to IDOR cookie manipulation
    as I interchanged the cookie of two account and it worked but the triage team responded by marking it as NON-APPLICABLE as they quoted "It's not worth it as you have to have cookies of both attacker as well as victim account" can you tell me if it's a Valid bug or it needs to land on NON APPLICABLE category...?
    Thanks agian.

    • @InsiderPhD
      @InsiderPhD  10 місяців тому

      Because when you use an endpoint with cookie A you’re affecting user A and with user Bs cookie you’re affecting user B. That is how it’s supposed to work and it’s intentional.

  • @ghostgil7006
    @ghostgil7006 Рік тому +1

    Can i use community edition of burp suite in a real bug hunting?

  • @knowledgeboxbd9625
    @knowledgeboxbd9625 3 роки тому

    Well explain 😍

  • @amumuwarszawa8547
    @amumuwarszawa8547 3 роки тому

    So if i understand in correct way login copy cookies logout and use cookies to login as other user ?

  • @Death_User666
    @Death_User666 8 місяців тому

    Never stop posting videos

  • @shekharwagh4982
    @shekharwagh4982 2 роки тому

    Was Able to Use Paypal Payment Token of User1 with User2 & vise-versa on a shopping portal. Is this also a case of IDOR vulnerability ?

  • @ohhmypenniereview8505
    @ohhmypenniereview8505 2 роки тому

    Hi kattie..
    How you get access victim account to see changes or victim cookies ,this big question

  • @manishneupane6070
    @manishneupane6070 2 роки тому

    Thank you so much mam 💞😊🇳🇵

  • @deepanshuyadav6745
    @deepanshuyadav6745 3 роки тому

    signing up Intigriti with ur link let's hope for the best

    • @InsiderPhD
      @InsiderPhD  3 роки тому +1

      I will keep my fingers crossed for you good luck! And good hunting my friend

  • @kofiarthur3402
    @kofiarthur3402 3 роки тому +1

    Hi Katie, wouldn't changing the cookies be a MITM Attack, which is invalid for I'm sure most programs.

    • @InsiderPhD
      @InsiderPhD  3 роки тому +1

      Yes if you are accessing your own account, here the cookie trick is to change the cookies to act like you are logged into one account but you can change another!

  • @jhonbash500
    @jhonbash500 3 роки тому

    Hey katie,
    What do you mean by "see if they've caused something to happen to account A"? at 16:54

    • @InsiderPhD
      @InsiderPhD  3 роки тому

      An IDOR occurs when one user (B) can access something they shouldn't, eg something on another user (A)'s account. So to test for that we do something on A's account, then repeat the request changing the cookies from A->B, if that then impacts As account, it means you could login as anyone and access anyones stuff.

    • @jhonbash500
      @jhonbash500 3 роки тому

      @@InsiderPhD Gotcha...

  • @kumaran88thiru
    @kumaran88thiru 3 роки тому +1

    Sweet

  • @TomTakesTime
    @TomTakesTime 3 місяці тому

    🔥

  • @zer0ql
    @zer0ql 3 роки тому +1

    4th place
    also as usual awesome video

  • @RomskieL
    @RomskieL 3 роки тому

    Im confused a little bit. Sorry. What if the cookie of user A contains user 's credentials like user id encoded in it. So if i will change the request of user B' s cookie to uaer A's cookies, it would be just like User A is sending the request right? So it's not an idor if that's the case right?

    • @InsiderPhD
      @InsiderPhD  3 роки тому

      Yes, if you can affect User B using User A's cookies or User A with user B's cookies, it's an IDOR

    • @szorba7417
      @szorba7417 3 роки тому

      @@InsiderPhD madam whats the difference between csrf and idor that you are talking about right know? Thankssss

  • @shreyaljain7484
    @shreyaljain7484 3 роки тому +3

    I got a doubt. What if the triage team asks how can an attacker get another user's cookie? And don't consider an impact?!

  • @0xanupam
    @0xanupam 10 місяців тому

    if they've caused something to happen to account A rather than B what to do next?

  • @ca7986
    @ca7986 3 роки тому

    ❤️

  • @eonraider4180
    @eonraider4180 3 роки тому

    Am I right to think that IDOR is a type of broken access control vulnerability? There's no mention to this in the video.

  • @LetsGoTech
    @LetsGoTech Рік тому

    There is authorize now

  • @abhimanyumishra8185
    @abhimanyumishra8185 3 роки тому +1

    Hey Katie ! Let's say I have found a cookie based IDOR , but this falls in the category of MITM because you have to steal cookies first !🤔
    Is this an false positive ?

  • @rishabhpant1828
    @rishabhpant1828 3 роки тому

    Till date, no findings :-((if you remember me from previous videos)

  • @cybersecurity3523
    @cybersecurity3523 3 роки тому +1

    Hello Dr

  • @MiVidaLoca1024
    @MiVidaLoca1024 2 роки тому

    Just FYI. in the IDOR videos of yours that I've watched, you've never explained what IDOR stands for. Looks like it's Insecure direct object reference. Learned about you from The Cyber Mentor (TCM).

  • @salmankhandu3819
    @salmankhandu3819 3 роки тому

    Is there any getting started video for any platform like hackerone, bugcrowd. I mean how to setup account ,start real target and report issue like that.
    Thank you

    • @InsiderPhD
      @InsiderPhD  3 роки тому

      I don’t know but I will make that video for you :)

    • @salmankhandu3819
      @salmankhandu3819 3 роки тому

      @@InsiderPhD thank you :)

    • @salmankhandu3819
      @salmankhandu3819 3 роки тому

      @@InsiderPhD when I expect such video? I am curious for that :) . In between if you find any reference kindly share?
      Thank you

    • @mizo7627
      @mizo7627 3 роки тому

      @@salmankhandu3819
      U can ckeck this ...she made it previously ua-cam.com/video/A0LTyH4tOmQ/v-deo.html

  • @priyamjha9755
    @priyamjha9755 3 роки тому +1

    please i want this video
    How to become a cyber security analyst full road map
    Topic is after 12 what should I do, with BCA, skills , course, jobs , salary, which is best and which in demand in future ( Web Exploitation, Cryptography, Reverse Engineering, Forensics, General Skills, Binary Exploitation)
    Almost full road map
    Please 🙏🙏

    • @InsiderPhD
      @InsiderPhD  3 роки тому +1

      Hi Priyam, it's hard to give you a roadmap without knowing you well, but this I think is a REALLY good graph - www.linkedin.com/pulse/map-cybersecurity-domains-version-20-henry-jiang-ciso-cissp as for what to learn it completely depends on what interests + excites you! Any jobs in security are going to be in demand so the world is your oyster!

    • @priyamjha9755
      @priyamjha9755 3 роки тому

      @@InsiderPhD thanks for this advice 🙏

  • @zozkabdulrahman4507
    @zozkabdulrahman4507 Рік тому

    l

  • @shrirangkahale
    @shrirangkahale 3 роки тому +1

    2nd
    @albonycal

  • @user-gc7nv5ly7f
    @user-gc7nv5ly7f Рік тому

    you missed up all of this.

  • @samwilliams8940
    @samwilliams8940 2 роки тому

    not the best video