Finding Your First Bug: Manual IDOR Hunting

Поділитися
Вставка
  • Опубліковано 14 лис 2024

КОМЕНТАРІ • 89

  • @ark3r745
    @ark3r745 5 років тому +102

    The best and most honest bug bounty hunter in the sec community, you have no idea about the help that you are doing to others .... thanks alot

  • @ggmaxx66
    @ggmaxx66 3 роки тому +7

    "populate burp with admin endpoints then hit them all as a user..." a golden nugget for me, thanks!

  • @helalsadat2077
    @helalsadat2077 4 місяці тому +2

    i have watched this video 1 and half month ago and i was able to identify a function prone to IDOR , i spent 20 days on that function and at the End i was able to bypass the access controls and view invoices, billing addresses, finance records, my report is triaged and waiting for bounty , thank you this video really gave me an Idea where to look for IDORs :) , But now i am watching it again since i started API hacking and i hope i will learn something new again in this video about API hacking

    • @InsiderPhD
      @InsiderPhD  Місяць тому

      NICE, now you need to unsubscribe because you are a pro ;)

  • @bobmatley6138
    @bobmatley6138 3 роки тому +3

    your videos actually explain hacking the the purest and most direct way! I am learning soo much! I plan to literally memorise all your videos!

  • @aashikyadav4439
    @aashikyadav4439 5 років тому +4

    idor = Insecure Direct Object Reference which tells you fucking nothing .
    your voice is amazing im loving it and you are doing great. thank you for this.

  • @anujpatel1654
    @anujpatel1654 3 роки тому +2

    I am going to watch every single video on your channel

  • @encodedguy9182
    @encodedguy9182 4 роки тому +1

    Thank You so much i heard about IDOR somewhere but didn't understand that time. By watching your video it is so much clear to me now. Thank you so much

  • @eed5278
    @eed5278 4 роки тому +38

    You're amazing. Thanks for contributing to the community, I hope to be able to do the same one day :)

    • @InsiderPhD
      @InsiderPhD  4 роки тому +19

      Please do! It's all I ask of my viewers who enjoy my content to please contribute back to the community, by sharing resources, talking to other newbie hackers, to write up interesting things they've found or even re-explain a resource for humans, there's a lot someone can contribute even if they haven't found their first bug yet.

  • @myname-mz3lo
    @myname-mz3lo 3 роки тому +2

    you explain things so well and are verry thoughtfull of what its like to be a beginer , thank you

  • @mohitnegi552
    @mohitnegi552 3 роки тому +2

    amazing video for bug hunters thankyou so much

  • @m.alaiady3627
    @m.alaiady3627 4 роки тому +3

    I really was confused about this IDOR term , but after watching this video it really help me a lot and it satisfy my points .. thanks again 🙏🏻

  • @lilp4p1
    @lilp4p1 4 роки тому +2

    Really good proctical demo tbh even if it's a ctf I do find it very instructfull

  • @yodamaxwell
    @yodamaxwell 2 роки тому +1

    Thank you very much, for the explanation, keep up the good work!

  • @chrisMa001
    @chrisMa001 4 роки тому +2

    Thank you for the great content, I am a beginner and would like to know how to create a working PoC to demonstrate how would an attacker use the idor vulnerability to attack? Thank you

  • @ihebhamad1477
    @ihebhamad1477 3 місяці тому

    Thank you for this great explanation

  • @trieulieuf9
    @trieulieuf9 4 роки тому +25

    Me when submitting a report: write everything carefully, double check, accept my report please.
    The guy in 13:03 : Fix this!

    • @cyberpirate007
      @cyberpirate007 4 роки тому

      Why u deleted your h1 account ??

    • @trieulieuf9
      @trieulieuf9 4 роки тому

      @@cyberpirate007 no i am still here, hackerone.com/trieulieuf9?type=user

  • @santiagosurt3825
    @santiagosurt3825 2 роки тому +1

    I'm noobie and this video is amazing for people like me, thanks!

  • @IamAnandJambhulkar
    @IamAnandJambhulkar 2 роки тому +1

    Very nicely explained. Thank you.

  • @Agung-yk7hr
    @Agung-yk7hr 5 років тому +2

    Your video very easy to understand can you upload more video 😁😁

  • @theodorpapa4710
    @theodorpapa4710 Рік тому

    really nice video im 15 and trying to learn bbh especially idors nice video

  • @AndrejMoharWeb
    @AndrejMoharWeb 4 роки тому +5

    Hello! Thank you so much for so many great videos. I especially like how all of them are geared towards becoming a real professional in the field. I do have a question, though: I've heard on your videos (and many others, like Stok's) that you mention using privileged (and unprivileged) accounts, alongside being signed out. I was wondering how do usually bug hunters get a privileged account, seeing as you usually can't just create one (you can usually create just an unprivileged user account). Does that mean only on programs that support that or is there usually a possibility to contact them and get a test high privilege account? Thanks!

    • @InsiderPhD
      @InsiderPhD  4 роки тому +5

      Yeah you’re correct, when we say that we’re talking about applications with permission levels that we can access, so on an app like Wordpress we have access to admin, user, guest by creating our own blogs but for something like email we only have access to a user, so that’s all we can test.

  • @alexnieto3136
    @alexnieto3136 4 роки тому +1

    This is one of the finest videos I saw on this matter. I have a question, do you think that when pentesting android apps through Google Play program is it valid for bounty to find IDORs in the endpoints that android app uses (not in the android code itself)?

    • @InsiderPhD
      @InsiderPhD  4 роки тому +2

      This is debatable, some programs will count that as the android app and some as the API. If the android app is in scope without excluding the API I would say that it is valid. I think it's a great easy way to get into android pentesting though! You can definitely find some low hanging fruit bugs!

  • @rajatdutta8365
    @rajatdutta8365 3 роки тому

    Nice explanation, really appreciate it. Thanks again

  • @droidhackerr
    @droidhackerr 3 роки тому +1

    You are the first and best 🖤💯

  • @regulator5
    @regulator5 5 років тому +1

    Very helpful. Keep making videos, please.

  • @ahmed_gamal2006
    @ahmed_gamal2006 4 роки тому +1

    You are amazing your videos are really helping me. Just one question what do you mean by find endpoint.
    Thank you.

    • @InsiderPhD
      @InsiderPhD  4 роки тому +2

      An endpoint is just a URL which does something on a web app, like if you have mywebsite.com/users/changeProfilePicture which changes the profile picture, that's an endpoint. When I say find them I mean do things on the application to fill up Burp with lots of URLs until you find something with an ID!

    • @ahmed_gamal2006
      @ahmed_gamal2006 4 роки тому

      @@InsiderPhD Thank you for the reply

  • @StefanRows
    @StefanRows 4 роки тому

    Great explanation Katie! Thanks!

  • @almmathis
    @almmathis 4 роки тому +4

    I became WAY more interested once she started cussing. My attention was fading...and the keywords popped me right back in!

    • @InsiderPhD
      @InsiderPhD  4 роки тому +3

      LMAO! I'll have to start swearing more!

    • @almmathis
      @almmathis 4 роки тому

      @@InsiderPhD On a serious note I have watched most of your videos at this point! Really good content, likes and subs from me!

  • @Mike-vq7hl
    @Mike-vq7hl 4 роки тому +4

    Thank you for your work

  • @syedumararfeen8146
    @syedumararfeen8146 4 роки тому +3

    The word should be Authorization rather than authentication for IDORs.
    Other than that, nice video.

    • @InsiderPhD
      @InsiderPhD  4 роки тому +2

      Thank you for the correction!

  • @worm_403
    @worm_403 14 днів тому

    excellent video

  • @nikhilmaan9498
    @nikhilmaan9498 2 роки тому +1

    thank you soo much i found my fist bug

  • @tommysuriel
    @tommysuriel 4 роки тому +2

    I've been bug hunting for like a month now, I've been looking for IDORs, CSRFs, XSS, HTML injection, Open Redirects. I can't find any websites (domains and subdomains) on H1 or Bugcrowd vulnerable to these vulnerabilities. I admit though for XSS I only know the basics and how to use a payload list on burpsuite. But still I can't find anything, Any tips? Should I focus on the more advanced ones like RCE and SQL injection?

    • @InsiderPhD
      @InsiderPhD  4 роки тому +8

      I think you just need to keep at it, I know it’s frustrating but they are there. Maybe look into a less crowded space like mobile? Might be worth a shot. Ignore SQL injection and RCEs, you won’t find one, they are for people with years of security experience.
      My top pieces of advice:
      1) make sure you check everything, like even endpoints which may not be particularly useful
      2) focus on bugs which can generate impact and be constantly on the lookout for them
      3) Cast a wide net, and keep trying if you find public programs too difficult get invites to private programs via stuff like the hacker101 ctf
      4) Find a niche, maybe learn mobile stuff, maybe go deep into learning a ton about APIs
      5) keep trying! Bug hunting is harder than it looks but you will get there if you try

    • @tommysuriel
      @tommysuriel 4 роки тому +1

      @@InsiderPhD Thank you so much, and thanks for your videos

    • @fuckitimsayingit3335
      @fuckitimsayingit3335 4 роки тому +1

      It takes time to find your first one! It gets easier tho, the best thing you can do is keep trying.

  • @cutyoursoul4398
    @cutyoursoul4398 4 роки тому

    Super useful video, thanks

  • @BearMeOut
    @BearMeOut 4 роки тому

    maybe other people will be a successful bug hunter in the future after watching the video. If it was me, after I got my first $10k from bounty, im gonna donated back to many education UA-camr who put free stuff like this. If you don't feel okay from taking patreon money, maybe put link to a charity organization that you like.
    Thanks for doing this! Looking forward for more videos!

    • @InsiderPhD
      @InsiderPhD  4 роки тому +3

      I only ask that people pay it forward, write about a bug you find, get involved in the community, help purchase learning mateirals for others, mentor someone, give out some tips on twitter. I'm far more interested in people helping others to learn and join this community than money!

  • @sarahconnorh4609
    @sarahconnorh4609 2 роки тому

    I have been looking for IDOR for days now but couldn't find at least one very low... Any idea what i'm doing wroong?

  • @mooreprr8067
    @mooreprr8067 2 роки тому

    You are fucking amazing! sending all positive vibrations your way :)

  • @bobmatley6138
    @bobmatley6138 3 роки тому

    With IDORS, the entry point for IDORS can be used for other injection attacks. if an IDOR was a UID0=, and the UID was queuing the users db, then can you launch other injection attacks, like SQL injection or stoed XSS?

    • @InsiderPhD
      @InsiderPhD  3 роки тому

      Yup, absolutely, this is actually something in the OWASP top 10, as often they aren't sanitised properly :)

  • @rushic24
    @rushic24 4 роки тому

    OMG you're the best, can you please make owasp top 10 hunting.

  • @benasin1724
    @benasin1724 5 років тому +1

    Great video

  • @Nick-cy2qd
    @Nick-cy2qd 4 роки тому

    If you (Burp actually) finds "password in the URL" of GET is that a type of IDOR and how do I proceed?

  • @nornsalon3646
    @nornsalon3646 4 роки тому +1

    You're the best!

  • @justtsanjint626
    @justtsanjint626 5 років тому

    Thank you for the video

  • @baravind719
    @baravind719 4 роки тому

    Need that doc

  • @bugsbunny6286
    @bugsbunny6286 4 роки тому

    Any tool to easily guess this different id parameter variables ?

  • @olivia7988
    @olivia7988 4 роки тому

    Very useful!! Thankss

  • @mubashirparay545
    @mubashirparay545 4 роки тому

    Very good content, i am glad to find such content. THANKSS!! Mam.
    One thing, why are u exhaling so heavily sometimes. Is it the excitement of capturing the flag or some other issue.

    • @InsiderPhD
      @InsiderPhD  4 роки тому

      Haha I'm just asthmatic and a big nervous when I make videos!

  • @rawkstar952
    @rawkstar952 4 роки тому

    hello Katie. Is Intigrity limited to European hackers only?

    • @InsiderPhD
      @InsiderPhD  4 роки тому +1

      Nope! It’s just they focus on European hackers! You can hack on any platform from anywhere :)

    • @rawkstar952
      @rawkstar952 4 роки тому

      @@InsiderPhD thank you so much. by the way, i'm currently on Intigrity and trying to find an Info Disclosure whilst watching your tips and tricks on how to do so. Good luck to me!

  • @opeyemei6011
    @opeyemei6011 4 роки тому

    This is good.. thanks

  • @muhammadhaleemkhan4186
    @muhammadhaleemkhan4186 4 роки тому +1

    what are Endpoints? i'm really confuse

    • @InsiderPhD
      @InsiderPhD  4 роки тому +6

      'Endpoints' are the final URL that you access
      So www.mywebsite.com/folder/ wouldn't be an endpoint but www.mywebsite.com/folder/file.php would be

    • @muhammadhaleemkhan4186
      @muhammadhaleemkhan4186 4 роки тому

      @@InsiderPhD ohhh thanks alot...i was expecting it..you are my mentor in Bug bounty...thanks alot...

    • @chriswang6674
      @chriswang6674 4 роки тому +1

      @@InsiderPhD Thank you for your explanation. As a newbie, I didn't know the meaning of Endpoint before found out this common.

  • @hossamshady1383
    @hossamshady1383 8 місяців тому

    you are great

  • @w0lverinew0lverine19
    @w0lverinew0lverine19 4 роки тому

    you are amazing. great content. how can i contact with you?

  • @swaysthinking838
    @swaysthinking838 4 роки тому

    Can anyone explain to me easily what she means when she's talking about endpoints? Thanks. 7:41

    • @InsiderPhD
      @InsiderPhD  4 роки тому +3

      Endpoint just means a webpage you can send stuff too. So what I’m saying is if you see something in burp like: /pages/admin/createPost you should replace the cookies of an admin user with lower permission users eg a guest user, I hope this helps!

    • @swaysthinking838
      @swaysthinking838 4 роки тому

      ​@@InsiderPhD So you mean when we are in some sort of admin endpoint, replacing the admin's cookies with a lower permission user's cookies(for example, session id) is an example of IDOR?

  • @steev910
    @steev910 5 років тому

    ohhh thank you so

  • @fakermankumar1327
    @fakermankumar1327 3 роки тому

    why everything is distorted at1080p

    • @InsiderPhD
      @InsiderPhD  3 роки тому

      Older video and I wasn’t great at video editing! Should I remake it? 🤔

    • @fakermankumar1327
      @fakermankumar1327 3 роки тому

      @@InsiderPhD it's OK

  • @watchandgainknowledge
    @watchandgainknowledge 4 роки тому

    I cant stop laughing, LMAO

  • @jeannasrallah730
    @jeannasrallah730 3 роки тому

    COOKIES
    If i just replace the cookies and get 200 ok
    Then get access to the account , it will consider an idor
    Please help!

    • @jeannasrallah730
      @jeannasrallah730 3 роки тому

      I recently reported one like that
      It will be my first bug !!