This content originally appeared on DEV Community and was authored by MakendranG
Process of BLST
Business logic attacks provide more information, higher impact, and perfect working comfort. Each logic attack is unique since it has to exploit a function or feature that is specific to each application.
PFB an example of a logic attack.
If you purchase 10 units of the same item, the online store will give you a big discount.
- The discount is applied when an attacker adds 10 items to the cart.
- The attacker took 9 items from the cart.
- The attacker gets the discount because the system hasn't checked if there are still enough items in the cart.
Many developers forget to implement sanity-checks
like these in many places because this example is easy to enforce. There are more complicated logic attacks
out there.
Logic attacks
are very common and are unique to each application and feature. The properties make it hard to find using automated tools.
How different is BLST ?
BLST helps service providers adjust their operations and react quickly to changing demand with its application-centered algorithms.
In terms of learning the traffic, this algorithm is unique. Their Artificial Penetration Tester product is able to work with any kind of web application because it learns the results after simulating attacks on the application.
A number of methodology products are combined into one to save time and effort.
How Business Logic is protected by BLST ?.
BLST provides a solution that helps the App Sec and DevOps teams understand the business logic attack flows and allows them to work more efficiently and ship better and more secure code faster. BLST uses an artificial intelligence model
that learns the usage of users in the system and begins to simulations of business logic attack flows before the system hits production.
Attacker
Early in the integration phase, Attacker mimics business logic attack flows. It can help you find business logic attack flows that could lead to the exposure of sensitive data.
Decider
The BLST Decider can detect a wide range of threats. The Decider can differentiate between normal and abnormal behavior
in the system and give you the ability to observe each abnormal case that has happened.
Runtime Validation
BLST compares the logs from the runtime to the OpenAPI specification to see if there are differences between the specification and what's running in production. A clear image for every use case suggests an easy path to quick remediation.
Gratitude for perusing my article till end. I hope you realized something unique today. If you enjoyed this article then please share to your buddies and if you have suggestions or thoughts to share with me then please write in the comment box.
This content originally appeared on DEV Community and was authored by MakendranG
MakendranG | Sciencx (2022-06-23T00:47:11+00:00) How does BLST work. Retrieved from https://www.scien.cx/2022/06/23/how-does-blst-work/
Please log in to upload a file.
There are no updates yet.
Click the Upload button above to add an update.