- Hands-On Application Penetration Testing with Burp Suite
- Carlos A. Lozano Dhruv Shah Riyaz Ahemed Walikar
- 100字
- 2021-07-02 12:16:38
Various business logic flaws
Every application has its own set of logic to get some functions done. Business logic is generally a set of steps required to get a job completed. Let's take an example where, if a user wants to purchase a product on the shopping site, he have to follow a series of steps:
- Select an item
- Specify the quantity of the product
- Enter delivery information
- Enter card details
- Complete payment gateway procedures
- Purchase complete
- Delivery pending
- Delivery complete
As you can see, a lot of steps are involved and this is where an automated scanner fails.
推薦閱讀
- 網(wǎng)絡(luò)安全意識導(dǎo)論
- Enterprise Cloud Security and Governance
- 數(shù)據(jù)安全與隱私計(jì)算(第3版)
- Building a Home Security System with BeagleBone
- 情報(bào)驅(qū)動應(yīng)急響應(yīng)
- Mastering Malware Analysis
- 黑客攻擊與防范實(shí)戰(zhàn)從入門到精通
- 網(wǎng)絡(luò)攻防實(shí)戰(zhàn)研究:MySQL數(shù)據(jù)庫安全
- 網(wǎng)絡(luò)安全監(jiān)控實(shí)戰(zhàn):深入理解事件檢測與響應(yīng)
- 安全網(wǎng)絡(luò)構(gòu)建
- INSTANT Microsoft Forefront UAG Mobile Configuration Starter
- 云安全深度剖析:技術(shù)原理及應(yīng)用實(shí)踐
- 網(wǎng)絡(luò)安全攻防技術(shù)實(shí)戰(zhàn)
- 精通Metasploit滲透測試(第3版)
- 黑客與安全技術(shù)指南