A sophisticated Insecure Direct Object Reference (IDOR) detection tool implementing cutting-edge techniques from recent security research.
- Multi-Parameter Fuzzing
Tests parameters in URLs, headers, cookies, and request bodies - Privilege Escalation Testing
Compares responses between high/low privilege sessions - Dynamic Wordlist Generation
Auto-generates target-specific parameters from page content - Advanced Response Analysis
Response fingerprinting + length comparison - Anti-Fingerprinting
Randomized delays + User-Agent rotation - Parallel Processing
Concurrent scanning of multiple endpoints - CSRF Protection Bypass
Automatic CSRF token handling
git clone https://github.com/yourrepo/advanced-idor-scanner.git
chmod +x idor_advanced.shDependencies:
curl, grep, sed, awk (standard Unix tools)
./idor_advanced.sh -u <URL> -w <WORDLIST> [OPTIONS]./idor_advanced.sh -u https://api.example.com/users -w params.txt./idor_advanced.sh -u https://api.example.com/v3/profile \
-w custom_wordlist.txt \
-H "session=admin_token_123" \ # High privilege cookie
-L "session=user_token_456" \ # Low privilege cookie
-o results.html| Flag | Description |
|---|---|
-u |
Target URL (required) |
-w |
Wordlist file (required) |
-H |
High privilege session cookie |
-L |
Low privilege session cookie |
-o |
Output file (HTML/JSON/TXT) |
-m |
HTTP methods to test (default: ALL) |
-t |
Request delay (default: 0.5s) |
export TOR_PROXY="socks5://localhost:9050" # Enable Tor routing
export MAX_THREADS=5 # Concurrent requests/api/[ID] # Numeric ID
/api/[UUID] # UUID patterns
/api/[../path] # Path traversal
/api/[encoded] # URL-encoded valuesgraph LR
A[High Privilege Request] --> B[200 OK]
C[Low Privilege Request] --> D[200 OK]
B --> E[Compare Responses]
D --> E
E --> F{Match?} -->|Yes| G[IDOR Found]
- Extract parameters from page HTML
- Identify UUID-like patterns
- Generate numeric sequences (1000-2000)
- Combine with user-provided wordlist
./idor_advanced.sh -u https://api.target.com/v1/documents \
-w api_params.txt \
-H "Authorization: Bearer admin123" \
-L "Authorization: Bearer user456"seq 1000 2000 > numeric_ids.txt
./idor_advanced.sh -u https://social.site/profile \
-w numeric_ids.txt \
-m "GET,PUT"| Issue | Solution |
|---|---|
| "Permission Denied" | chmod +x idor_advanced.sh |
| Wordlist Not Found | Use absolute file paths |
| Session Comparison Failing | Verify cookie values with browser |
| False Positives | Adjust response similarity threshold |
- OWASP IDOR Prevention Cheat Sheet
- PortSwigger IDOR Research Papers
- Bug Bounty Methodology Reports (2022-2024)
Use this tool only on authorized systems. Never conduct security testing without proper authorization.
MIT License - See LICENSE file
This README includes:
1. Clear installation/usage instructions
2. Visual diagrams for complex processes
3. Real-world examples
4. Troubleshooting guide
5. Configuration options
6. Advanced technique explanations
7. Safety/legal considerations
Would you like me to add any specific sections or modify existing content?