All
Search
Images
Videos
Shorts
Maps
News
Copilot
More
Shopping
Flights
Travel
Notebook
Report an inappropriate content
Please select one of the options below.
Not Relevant
Offensive
Adult
Child Sexual Abuse
Objects
of Refernce
Object of Reference
Communication
Objects of Reference
Edward
Object of Reference
Activities
Example of Objects
of Refence
Objects of Reference
in Use
Objects of Reference
Bild
Aet Objects
of Reference
Objects of Reference
Speech and Language
Objects of Reference
Resources
2204355
Object
Mayhem
Object
Insanity
Object
Illusion
Using Objects of Reference
with Pupils
Tower Hamlets Summer of Fun
Onbhects of Refernce Communication
How to Use
Objects of Reference YouTube
Length
All
Short (less than 5 minutes)
Medium (5-20 minutes)
Long (more than 20 minutes)
Date
All
Past 24 hours
Past week
Past month
Past year
Resolution
All
Lower than 360p
360p or higher
480p or higher
720p or higher
1080p or higher
Source
All
Dailymotion
Vimeo
Metacafe
Hulu
VEVO
Myspace
MTV
CBS
Fox
CNN
MSN
Price
All
Free
Paid
Clear filters
SafeSearch:
Moderate
Strict
Moderate (default)
Off
Filter
Objects
of Refernce
Object of Reference
Communication
Objects of Reference
Edward
Object of Reference
Activities
Example of Objects
of Refence
Objects of Reference
in Use
Objects of Reference
Bild
Aet Objects
of Reference
Objects of Reference
Speech and Language
Objects of Reference
Resources
2204355
Object
Mayhem
Object
Insanity
Object
Illusion
Using Objects of Reference
with Pupils
Tower Hamlets Summer of Fun
Onbhects of Refernce Communication
How to Use
Objects of Reference YouTube
7:33
YouTube
Aikido Security
IDOR Explained: The Most Common Web App Vulnerability
IDOR (Insecure Direct Object Reference) is one of the most common vulnerabilities in web applications. In this video, we explain how IDOR and BOLA (Broken Object Level Authorization) work, how attackers exploit them through APIs and IDs, and why they are part of broken access control. We also look at the Optus data breach as a real-world ...
3.4K views
1 month ago
Related Products
Insecure Direct Object Reference
Insecure Direct Object Reference and Security PPT
Direct Object Reference Pentest
#Insecure Direct Object Reference Examples
Exploiting Insecure Direct Object References (IDOR)
YouTube
2 months ago
Access control 9 | Insecure direct object references
YouTube
6 months ago
Top videos
13:28
Insecure Direct Object Reference / IDOR Explained // How to Bug Bounty
YouTube
NahamSec
60.2K views
Feb 28, 2024
4:48
Quick Intro to Insecure Direct Object References (IDORs) & How You Can Fix Them
YouTube
AWS Developers
3.1K views
Dec 19, 2023
1:15
Day 25 – IDOR | Insecure Direct Object Reference Explained#Day25#CyberSecurity#EthicalHacking#IDOR
YouTube
AB Zerosix
1.9K views
1 month ago
How to Prevent Insecure Direct Object Reference
12:33
WebGoat IDOR (Insecure Direct Object Reference) | Complete guide with proper explanation.
YouTube
Shubham Jangra
202 views
2 months ago
2:45
Challenge 2 - IDOR Access Protector | Weekend Dev 45 | Cybersecurity Projects
YouTube
Learn to Code with CodeChef
15 views
3 weeks ago
3:07
Can Insecure Direct Object References Be Prevented?
YouTube
Server Logic Simplified
5 months ago
13:28
Insecure Direct Object Reference / IDOR Explained // How to Bug Bounty
60.2K views
Feb 28, 2024
YouTube
NahamSec
4:48
Quick Intro to Insecure Direct Object References (IDORs) & How You Can Fix Them
3.1K views
Dec 19, 2023
YouTube
AWS Developers
1:15
Day 25 – IDOR | Insecure Direct Object Reference Explained#Day25#CyberSecurity#EthicalHacking#IDOR
1.9K views
1 month ago
YouTube
AB Zerosix
1:15
IDOR Vulnerability 😱 | Insecure Direct Object Reference Explained Simply
20 views
1 month ago
YouTube
HackWithKunal
7:04
IDOR Explained with Real-World Examples| Insecure Direct Object Reference Vulnerability in 5 Minutes
288 views
11 months ago
YouTube
Cyberbugs Cybersecure
0:36
Exploiting Insecure Direct Object References (IDOR)
463 views
2 months ago
YouTube
The Cyber Terminal
3:21
Access control 9 | Insecure direct object references
791 views
6 months ago
YouTube
Mukesh Pyda [TORHAT]
6:32
Insecure Direct Object Reference (IDOR) – Explications
483 views
5 months ago
YouTube
Cyberretta
18:10
TryHackMe IDOR Full Walkthrough 2025 - Insecure Direct Object Reference
895 views
8 months ago
YouTube
Djalil Ayed
12:33
WebGoat IDOR (Insecure Direct Object Reference) | Complete guide with proper explanation.
202 views
2 months ago
YouTube
Shubham Jangra
3:50
IDOR (Insecure Direct Object Reference) Explained | Bug Bounty | Educational Purpose Only
403 views
8 months ago
YouTube
Farhan Academy
21:38
Insecure Direct Object Reference (IDOR) Methodology | Bug Bounty Explained
169 views
7 months ago
YouTube
JakSec
1:26
IDOR Explained With a Real Data Breach
10.5K views
1 month ago
YouTube
Aikido Security
0:56
Understanding IDOR (Insecure Direct Object Reference) | Redfox Security
4.5K views
Jul 15, 2024
YouTube
Redfox Security
0:46
Hackers Find Hidden IDOR Vulnerability in Seconds!
867 views
1 month ago
YouTube
MRE Security
3:09
IDOR Lab — Exploiting Insecure Direct Object References with Kali (Go Hack Yourself)
180 views
7 months ago
YouTube
NetworkHaz
2:57
WebGoat - (A1) Insecure Direct Object References
1 views
1 month ago
YouTube
Zeyrnic
0:45
Insecure Direct Object Reference (IDOR) - System Design
1.3K views
1 month ago
YouTube
Greg Hogg
11:18
IDOR vulnerability Step-by-Step PoC Walkthrough | Live target
740 views
Oct 5, 2024
YouTube
hack with rohit
7:18
IDOR Vulnerability Live POC Demo | How Hackers Change Other Users’ Data (Bug Bounty)
795 views
4 months ago
YouTube
WhitePointyHatHacker
33:32
IDOR Vulnerability Practical | Hack Accounts Without Password (Day#05)
680 views
3 months ago
YouTube
Cyber Guard
1:24:50
🔥 Day 15 How to Find IDOR Vulnerability Using AI | Bug Hunting Tutorial | hacker vlog
2.6K views
2 months ago
YouTube
Hacker Vlog
8:14
Insecure Direct Object Reference (IDOR) Explained
119.7K views
Feb 12, 2019
YouTube
PwnFunction
12:45
Insecure Direct Object Reference (IDOR): What it is and how it works
2.5K views
Apr 20, 2025
YouTube
RINKU
28:00
Mastering WebGoat: Overcoming Insecure Direct Object References - A Complete Guide
2.1K views
Jun 2, 2023
YouTube
Security in mind
4:29
Master IDOR Vulnerability | Insecure Direct Object References Explained & Exploited! | DevAcademix
55 views
Mar 15, 2025
YouTube
DevAcademix Cyber Hub
2:55
IDOR Vulnerability Explained with bWAPP - Insecure Direct Object References Tutorial
105 views
Feb 22, 2025
YouTube
CourseBlitz
18:21
Insecure Direct Object Reference ("IDOR") Attack & Defense
2.6K views
Mar 11, 2023
YouTube
Nick Berrie
See more
More like this
Feedback