Summary

In this chapter, we reviewed how to detect specific vulnerabilities. While in the previous chapter, the vulnerabilities explained were detected by detecting patterns, in this case, the vulnerabilities needed more understanding about the application's flow.

The flaws explained in this chapter could be used to gain access to sensitive information, break authorization and authentication, and be part of a bigger compromise. In the next chapter, we will be exploiting different kinds of vulnerabilities using Burp tools and extensions.

..................Content has been hidden....................

You can't read the all page of ebook, please click here login for view all page.
Reset
18.217.4.206