Penetration Testing
Ctrlk
  • Web
    • Reconnaissance
    • Open Source Intelligence
    • Misconfiguration
    • Identity Management
    • Broken Authentication
    • Broken Authorization
    • Session Management
    • Input Validation
    • Error Handling
    • Weak Cryptography
    • Business Logic
      • Logic Data Validation
      • Ability to Forge Requests
      • Integrity Checks
      • Process Timing
      • Race Conditions
      • Circumvention of Work Flows
      • Defenses Against Application Misuse
      • Upload of Unexpected File Types
      • Upload of Malicious Files
      • Payment Functionality
    • Client Side
    • API Attacks
  • Mobile
    • Mobile App Taxonomy
    • Mobile App Security Testing
    • General
    • Android
    • iOS
  • Cloud
    • Reconnaissance
    • SaaS
    • IaaS
    • Azure
    • AWS
    • GCP
    • IBM
    • Digital Ocean
    • Kubernetes
    • CI/CD
    • Active Directory
  • Network
    • Introduction
    • Intelligence Gathering
    • Vulnerability Analysis
    • Logical Vulnerabilities
    • Exploitation of Remote Services (User-Mode)
    • Exploitation of Remote Services (Kernel-Mode)
  • Wireless
    • Page 4
  • iot
    • Page 5
Powered by GitBook
On this page
  1. Web

Business Logic

Logic Data ValidationAbility to Forge RequestsIntegrity ChecksProcess TimingRace ConditionsCircumvention of Work FlowsDefenses Against Application MisuseUpload of Unexpected File TypesUpload of Malicious FilesPayment Functionality
PreviousWeak EncryptionNextLogic Data Validation

Last updated 2 years ago