In my previous post, I wrote about Broken Authentication, Session Management and Cross Site Scripting. Today, I will continue talking about some more checkpoints to be kept in mind while performing OWASP testing. Insecure Direct Object References This involves modifying ... Continue reading →