What is business logic !?

The way that the application should handle the data and it’s flow

Untitled

Here is an example

Untitled

App 1 want the user to enter an ID

The logic behind Application 1 Is

  1. the application want the user to enter the id of a living person

  2. the vulnerability is that the user entered the id of deceased person and the application accept it

App 2 want the user to enter an ID

The logic behind Application 2 Is

  1. the application want the user to enter the id of a deceased person

  2. the vulnerability is that the user entered the id of living person and the application accept it

So that we overcome the application logic and that makes this vulnerability hard to spot

So as a penetration tester you have to understand the business logic what is supposed to do and beside the technical testing you should try to see if there anyway that the business logic of the application can be broken

Now we will have a look at may classes and example scenarios

First business logic data validation