good examples - thx for explanation; I like this series!
@devcentral2 жыл бұрын
...and thanks for the comment! :-) Glad you enjoyed the video!!
@proFFessor90 Жыл бұрын
this one kinda confuses me a lot. it looks like it can be described as "logical/flow issues". need to take a closer look, atm this one is weird
@huy19437 Жыл бұрын
How do they know the others request from Attackers is actually one?
@medhasni64322 жыл бұрын
So it s just a business logic error, right?
@Sminthsonth2 жыл бұрын
indeed
@barebears2892 жыл бұрын
Thank you😄
@aishatalha53732 жыл бұрын
can we detect these with the help of any Software or tool maybe ?
@aubreyking36852 жыл бұрын
You bet. Any DAST or web app scanner searches for these out of the gates. We are partnered with several companies for importing scan data from these tools for our F5 Advanced Web Application Firewall. In this way, you get to understand the holes in your applications and then protect them appropriately while they get fixed. App development times can be lengthy, but WAF policy can be applied in minutes from a scan like that.
@mistmedia3712 Жыл бұрын
OWASP ZAP is definitely a big one if not the biggest
@petersdicki56882 жыл бұрын
How do you write backwards?
@devcentral2 жыл бұрын
Thanks for the comment! Here's how we produce these: kzbin.info/www/bejne/i2iokH9qrKiDisU
@winkyty8927 күн бұрын
@@devcentral but the label on the shirt stays the same... in the right position... i'm so confused, but thx for the video anyway
@devcentral23 күн бұрын
@@winkyty89 yep...stage tricks! We had shirts with reverse logos on the wrong side, so when we flip the image, all is well! :)