Answer:
Attackers can exploit a business logic flaw in a multi-step process, such as account registration, by skipping or manipulating steps to bypass intended processes and gain unauthorized access.
Attackers can exploit a business logic flaw in a multi-step process, such as account registration, by skipping or manipulating steps to bypass intended processes and gain unauthorized access.
You may be interested in:
Web Security MCQs