8
Business Logic Testing
Hooray! You’re a third of the way through. In this chapter, we will be covering business logic flaws. Business logic flaws are types of errors where an attacker finds ways of using an application’s actual handling stream in a manner that has a negative impact on the associations.
Here, you will learn how to bypass the frontend GUI application and send data directly to the backend for processing by forging requests. We’ll also discover how to manipulate and disrupt designed business process flows by simply keeping active sessions open and failing to submit transactions within the expected time frame in the Test for process timing recipe. Furthermore, we will learn about workflow vulnerabilities that include any flaw that ...
Get Zed Attack Proxy Cookbook now with the O’Reilly learning platform.
O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.