Learn how to find and exploit IDOR vulnerabilities in a web application giving you access to data that you shouldn't have.
Insecure Direct Object Reference
http://online-service.thm/profile?user_id=1305
http://online-service.thm/profile?user_id=1000
https://onlinestore.thm/order/1234/invoice
https://onlinestore.thm/order/1000/invoice
Base64 Decode and Encode - Online
CrackStation - Online Password Hash Cracking - MD5, SHA1, Linux, Rainbow Tables, etc.
/user/details
/user/details?user_id=123
https://LAB_WEB_URL.p.thmlabs.com
/api/v1/customer?id={user_id}