Did you know Cybrary has FREE video training? Join more than 2,500,000 IT and cyber security professionals, students, career changers, and more, growing their careers on Cybrary.
This lesson discusses Insecure Object Reference (IDOR). This occurs when a developer exposes a reference to an internal implementation object such as a file, directory or database key. Attackers can then manipulate these objects to access data. The attack vector exploit-ability is very easy. This unit also covers data leakage, specifically authentication versus authorization.