• Intro
  • Identifying IDORs
  • Mass IDOR Enumeration
  • Bypassing Encoded References
  • IDOR in Insecure APIs
  • Chaining IDOR Vulnerabilities
  • IDOR Prevention