Assessing Business Logic

In this chapter, we will cover the following recipes:

  • Testing business logic data validation
  • Unrestricted file upload – bypassing weak validation
  • Performing process-timing attacks
  • Testing for the circumvention of workflows
  • Uploading malicious files – polyglots
..................Content has been hidden....................

You can't read the all page of ebook, please click here login for view all page.
Reset
18.219.208.117