Business Logic Testing
Hooray! You’re a third of the way through. In this chapter, we will be covering business logic flaws. Business logic flaws are types of errors where an attacker finds ways of using an application’s actual handling stream in a manner that has a negative impact on the associations.
Here, you will learn how to bypass the frontend GUI application and send data directly to the backend for processing by forging requests. We’ll also discover how to manipulate and disrupt designed business process flows by simply keeping active sessions open and failing to submit transactions within the expected time frame in the Test for process timing recipe. Furthermore, we will learn about workflow vulnerabilities that include any flaw that enables an attacker to abuse a system or application in such a way that they can avoid (not follow) the workflow that was planned or built.
Lastly, we’ll look at unexpected file type uploads, where the application...