Abstract

The rich functions of web applications have played an important role in the rapid development of the Internet. Different web applications have different functions. Compared with traditional XSS vulnerabilities, SQL injection vulnerabilities, and command execution vulnerabilities, the security issues involved in different server functions of Web applications vary widely, which leads to the absence of general solutions for specific security vulnerabilities in business logic process. After analyzing the security of the business logic process, it can be found that when the various security points of the business logic process are used by the attacker, and the behaviour of the attacker does not have any obvious difference from the normal user, which leads to the inability to achieve effective protection by directly using various types of scripts. Therefore, it is of practical significance to research a penetration detection idea of a logical vulnerability.

Full Text
Published version (Free)

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call