From the course: Certified Ethical Hacker (CEH)

Unlock this course with a free trial

Join today to access over 24,800 courses taught by industry experts.

Attacking application logic flaws and shared environments

Attacking application logic flaws and shared environments

From the course: Certified Ethical Hacker (CEH)

Attacking application logic flaws and shared environments

- [Instructor] Let's go over into attacking web application logic flaws and shared environments. Understanding these type of vulnerabilities is definitely important for identifying and mitigating risk in web applications, and I want to actually break down the key concepts and techniques that are involved. The first thing is actually understanding, what are application logic flaws? Application logic flaws are vulnerabilities that occur when the logic of an application doesn't function as intended. An example of that is inadequate validation of user inputs, improper handling of application states or the flawed workflow of the application itself. And there are different techniques that you can use to identify logic flaws, including reviewing how the application logic is supposed to work, and identify areas where they may be exploited. And, of course, testing the application, how it will handle unexpected or extreme input conditions and so on. Logic flaws are often invisible to people who…

Contents