Insecure Direct Object Reference (IDOR) vulnerabilities are still in the wild and could lead to, for example, horizontal privilege escalation. A user could modify certain values in a web application and gain access to unauthorised data. Developing a vulnerable application Moreover, the vulnerable web application was developed using Python with…
personal data
Used storage devices such as SD cards and USB sticks are sold on different sites. There are many used devices available for purchase on both eBay and Amazon. However, many sellers do not have competence regarding how to sufficiently wipe these devices. Furthermore, I chose to purchase a set of…