Pentest Journeys
search
Ctrlk
Connectchevron-down
  • 👋 Welcome
  • Boxes
    • Categories
    • Starting Pointchevron-right
    • Easychevron-right
    • Mediumchevron-right
    • Hardchevron-right
    • Insanechevron-right
  • Cloudchevron-right
  • TL;DR
    • Active Directorychevron-right
    • Cloudchevron-right
    • External Platformschevron-right
    • Infrachevron-right
  • Logschevron-right
  • Networkingchevron-right
  • Pivotingchevron-right
  • Red Teamingchevron-right
  • Social Engineeringchevron-right
  • Webchevron-right
    • APIchevron-right
    • Applicationschevron-right
    • Common Findingschevron-right
    • Authenticationchevron-right
    • Authorizationchevron-right
      • IDOR / BOLA
      • IDOR / BFLA
      • Weak Access Controls
      • Automated A-B Testing
    • CMSchevron-right
    • Cross-Originchevron-right
    • DevOpschevron-right
    • Dirbusting
    • File Inclusionchevron-right
    • File Uploadschevron-right
    • Frameworkschevron-right
    • Injectionschevron-right
    • Mass Assignment
    • Open Redirects
    • OpenFire
    • Race Conditions
    • SSRFchevron-right
    • WAFs
    • WebDAV
    • Web Serverschevron-right
    • WebSockets
    • Web Toolschevron-right
  • Tools
    • Hydra
    • Creds
    • Port Scanners
    • Passwordschevron-right
    • Searchsploit
    • Metasploitchevron-right
    • Wordlists
    • Vulnerability Scanners
    • Text Processing
    • Shells
    • File Transfers
    • Cryptography
    • Files
    • Steganography
    • KeePass
  • Traffic Capture
  • Package Managerschevron-right
  • Services
    • TCPchevron-right
    • UDPchevron-right
  • Methodologies
    • OSCPchevron-right
    • CRTP
gitbookPowered by GitBook
block-quoteOn this pagechevron-down
  1. Web

Authorization

IDOR / BOLAchevron-rightIDOR / BFLAchevron-rightWeak Access Controlschevron-rightAutomated A-B Testingchevron-right
PreviousJWTschevron-leftNextIDOR / BOLAchevron-right

Was this helpful?

Was this helpful?