YoVDO

Web Application Penetration Testing: Business Logic Testing

Offered By: Pluralsight

Tags

Penetration Testing Courses Security Testing Courses

Course Description

Overview

Business logic flaws are context specific and very hard for automated tools to discover. This course will teach you how to identify and exploit business logic vulnerabilities.

Web Applications are sometimes designed based on flawed assumptions about how business logic should work, using the application in unintended ways may result in outstanding security vulnerabilities with a critical business impact . In this course, Web Application Penetration Testing: Business Logic Testing, you’ll learn to assess business logic flaws in modern web applications. First, you’ll explore scoping, and how to get the relevant business logic context of the application. Next, you’ll discover how to exploit business logic flaws based on the OWASP WSTG. Finally, you’ll learn how to identify and advise on bad design practices. When you’re finished with this course, you’ll have the skills and knowledge of business logic testing needed to assess the security of web applications.

Syllabus

  • Course Overview 1min
  • Defining Business Logic Testing 16mins
  • Exploiting Weak Data Validation 16mins
  • Attacking Business Workflows 10mins
  • Testing File Upload Mechanisms 19mins

Taught by

Cristian Pascariu

Related Courses

Network Security
Georgia Institute of Technology via Udacity
Proactive Computer Security
University of Colorado System via Coursera
Identifying, Monitoring, and Analyzing Risk and Incident Response and Recovery
(ISC)² via Coursera
Hacker101
HackerOne via Independent
CNIT 127: Exploit Development
CNIT - City College of San Francisco via Independent