Answer:
The primary goal of attackers exploiting business logic flaws in access controls is to manipulate business processes and gain unauthorized access.
The primary goal of attackers exploiting business logic flaws in access controls is to manipulate business processes and gain unauthorized access.
You may be interested in:
Web Security MCQs