Answer:
The primary goal of an attacker exploiting business logic flaws is to achieve unauthorized access or financial gain by exploiting weaknesses in business processes.
The primary goal of an attacker exploiting business logic flaws is to achieve unauthorized access or financial gain by exploiting weaknesses in business processes.
You may be interested in:
Web Security MCQs - PART 2