As we saw in the previous chapter, Burp Suite is useful for identifying different kinds of vulnerabilities. In the previous chapter, the majority of them were input validation errors that were detected using the Intruder tool. In this chapter, we will check errors that are not related to input validation weaknesses.
We will cover the following topics in this chapter:
- Detecting CSRF
- Detecting insecure direct object references
- Detecting security misconfigurations
- Detecting insecure deserialization
- Detecting OAuth-related issues
- Detecting broken authentication