Ports Wigger
Ports Wigger
Database keys
Query parameters
User or session IDs
Filenames
2. Body manipulation
Body manipulation is very similar to URL tampering, except that the attacker
is modifying one or more values in the body of the document instead of in
the URL. This can mean changing the values of radio buttons, checkboxes, or
other form elements. It might also be possible to change hidden form values.
Perhaps a contact has a hidden form value that passes on the user ID for the
currently logged-in account. If we can change that hidden value prior to form
submission, we can make our request appear to come from a different user.
4. Path traversal
Path traversal, also called directory traversal, is a unique type of IDOR
vulnerability that an attacker leverages to access or manipulate files or
folders directly on the server that runs the web application. This is a level
deeper than other types of IDOR attacks because it allows direct access to
file system resources instead of database records. Path traversal can allow
an attacker to access configuration files, discover user credentials, or even
obtain a fully functional shell on the target.