Top 10 business flaw logic attacks

Top 10 Business Logic Attack Vectors Attacking and Exploiting Business Application Assets and Flaws – Vulnerability Detection to Fix

Cover

Some attacks, like a syntax-based web application attack are simple to understand, formulaic, and therefore easy to prepare for. Others however, like business logic attacks, make security more of an art than a science.

In this white paper, gain an overview of the top 10 business logic flaw attacks like:

  1. Authentication flags and privilege escalations at application layer
  2. Critical Parameter Manipulation and Access to Unauthorized Information/Content
  3. Developer’s cookie tampering and business process/logic bypass

As well as some tips on how you can test and eliminate these kinds of vulnerabilities.

Vendor:
Rapid7
Posted:
07 Jun 2017
Published:
07 Jun 2017
Format:
PDF
Length:
15 Page(s)
Type:
White Paper
Language:
English
Already a Bitpipe member? Login here

Download this White Paper!

By submitting your personal information, you agree that TechTarget and its partners may contact you regarding relevant content, products and special offers.

You also agree that your personal information may be transferred and processed in the United States, and that you have read and agree to the Terms of Use and the Privacy Policy.