paint-brush
How Does the Adversarial Cycle Apply to Coding and Security? by@blackfedoradev
107 reads

How Does the Adversarial Cycle Apply to Coding and Security?

by Black Fedora3mApril 8th, 2022
Read on Terminal Reader
Read this story w/o Javascript
tldt arrow

Too Long; Didn't Read

The majority of application security problems stem from software bugs that leave the existing security controls, broken. However, even if the code is perfect it doesn’t mean an attacker can’t exploit it. The vulnerability can be hidden inside the business logic, not the code that powers it. This type of vulnerability is called business logic vulnerability. It’s when an attacker abuses a legitimate flow of an application so that it results in negative consequences. An example could be a contact form on a website that is used for sending out emails to the service owners. This form can be abused to send out spam messages instead of genuine support requests.

Coin Mentioned

Mention Thumbnail
featured image - How Does the Adversarial Cycle Apply to Coding and Security?
Black Fedora HackerNoon profile picture
Black Fedora

Black Fedora

@blackfedoradev

Tips on Application Security and Anti-Abuse

Learn More
LEARN MORE ABOUT @BLACKFEDORADEV'S
EXPERTISE AND PLACE ON THE INTERNET.
L O A D I N G
. . . comments & more!

About Author

Black Fedora HackerNoon profile picture
Black Fedora@blackfedoradev
Tips on Application Security and Anti-Abuse

TOPICS

THIS ARTICLE WAS FEATURED IN...

Permanent on Arweave
Read on Terminal Reader
Read this story in a terminal
 Terminal
Read this story w/o Javascript
Read this story w/o Javascript
 Lite