The author explains how combining reconnaissance and an IDOR vulnerability led to unauthorized access to hundreds of credit card records. Medium.