Learn Excel & Financial Modeling the Way Finance Teams Actually Use Them
Lead AI Strategy with UCSB's Agentic AI Program — Microsoft Certified
Overview
Google, IBM & Meta Certificates — All 10,000+ Courses at 40% Off
One annual plan covers every course and certificate on Coursera. 40% off for a limited time.
Get Full Access
Learn how to identify and exploit business logic vulnerabilities in applications through this 40-minute DEF CON 31 DCGVR Village presentation. Explore techniques for discovering flaws in application logic that can lead to system compromises, demonstrated by security researcher Abhijeet Singh. Understand the methodology behind finding and exploiting logical weaknesses that bypass traditional security controls, enabling you to better secure applications against these subtle but dangerous attack vectors.
Syllabus
DEF CON 31 DCGVR Village - Abhijeet Singh - Taking Down Applications With Logic
Taught by
DEFCONConference