How to find and exploit IDOR vulnerabilities in a web application giving you access to…