This site is the archived OWASP Foundation Wiki and is no longer accepting Account Requests.
To view the new OWASP Foundation website, please visit https://owasp.org
OWASP AppSec DC 2012/Anatomy of a Logic Flaw
From OWASP
Revision as of 20:45, 2 March 2012 by Mark.bristow (talk | contribs) (Created page with "<noinclude>{{:OWASP AppSec DC 2012 Header}}</noinclude> __NOTOC__ == The Presentation == rightTraditional vulnerabilities like SQL Injection, ...")
Registration Now OPEN! | Hotel | Schedule | Convention Center | AppSecDC.org
The Presentation
Traditional vulnerabilities like SQL Injection, buffer overflows, etc, have well established techniques for discovery and prevention. On the other hand, logic flaws are incredibly diverse and often unique to the specific application or business organization. Because of this, logic flaws have taken on a near mythical status. In the myth, logic flaws are nearly impossible to find until the elite of the elite hackers launch an attack to completely own the application.The reality is far different; logic flaws are not the complex nightmare that many have made them out to be. This presentation will use real-world examples to show how logic flaws are typically introduced into an application, how they can be consistently detected during testing, and how they can be prevented during development. Instead of hoping for magic, repeatable processes will be outlined for each of those items. This will prove beneficial to anyone responsible for application security: programmers, architects, managers, and pen testers.
The Speakers
Charles Henderson and David Byrne
Gold Sponsors |
![]() |
![]() |
![]() |
![]() |
Silver Sponsors |
![]() | |||
Small Business |
![]() |
![]() | ||
Exhibitors |
![]() |
![]() |
![]() |
![]() |