Introduction
  • Introduction
  • how to setup burpsuite
parameter tampering
  • Excessive trust in client-side controls
  • High-level logic vulnerability
  • Low-level logic flaw