HACK STEPS (continued)
■
If access controls are found to be broken, and resource identifiers are
found to be predictable, you can mount an automated attack to harvest
sensitive resources and information from the application. Use the tech-
niques described in Chapter 13 to design a bespoke automated attack to
retrieve the data you require.
A catastrophic vulnerability of this kind occurs where an Account
Do'stlaringiz bilan baham: