In this section, we will focus on exploiting flaws that exist in the business logic of an application, covering in-depth examples. We will also cover methods for fuzzing a web application in order to find a vulnerability and writing reports about it.
This section contains the following chapters:
- Chapter 14, Web Application Fuzzing – Logical Bug Hunting
- Chapter 15, Writing Penetration Testing Reports