pentest-business-logic

Business logic vulnerability testing — workflow bypass, payment manipulation, state machine abuse, and function limit circumvention per WSTG-BUSL.

Safety Notice

This listing is imported from skills.sh public index metadata. Review upstream SKILL.md and repository scripts before running.

Copy this and send it to your AI assistant to learn

Install skill "pentest-business-logic" with this command: npx skills add jd-opensource/joysafeter/jd-opensource-joysafeter-pentest-business-logic

Pentest Business Logic

Purpose

Identify flaws in application workflow enforcement, business rule validation, and state machine integrity that cannot be found by taint analysis or pattern matching. These vulnerabilities require understanding intended behavior and finding deviations.

Prerequisites

Authorization Requirements

  • Written authorization with explicit scope for business logic testing
  • Test accounts at multiple privilege levels (user, admin, premium, etc.)
  • Test payment methods or sandbox payment environment for financial testing
  • Rollback plan for any data-mutating tests (order creation, account changes)

Environment Setup

  • Burp Suite Professional with Repeater/Intruder configured
  • Playwright or Selenium for multi-step browser automation
  • Proxy configured to capture all application traffic
  • Test data seeded for workflow testing (products, coupons, user accounts)

Core Workflow

  1. Workflow Mapping: Extract multi-step flows (checkout, registration, approval chains, onboarding) from recon deliverables and source code. Document expected state transitions and business constraints.
  2. Rule Extraction: Identify server-side business constraints — price validation, quantity limits, role-gated actions, time-based restrictions, coupon rules, referral limits.
  3. Step Circumvention: Skip, replay, reorder steps in multi-step workflows. Access final-step endpoints directly without completing prerequisites (WSTG-BUSL-06).
  4. Data Integrity Abuse: Submit negative quantities, zero-price items, boundary values, type confusion in business fields. Test forged request parameters (WSTG-BUSL-02/03).
  5. Function Limit Bypass: Test coupon reuse, referral loops, vote stuffing, resource exhaustion through legitimate endpoints (WSTG-BUSL-05).
  6. File Upload Logic: Upload unexpected file types, oversized files, polyglot files, content-type mismatch, path traversal in filenames (WSTG-BUSL-08/09).
  7. Payment Testing: Price manipulation at each checkout stage, currency confusion, discount stacking, partial payment abuse (WSTG-BUSL-10).

WSTG Coverage

WSTG IDTest NameStatus
WSTG-BUSL-01Test Business Logic Data Validation
WSTG-BUSL-02Test Ability to Forge Requests
WSTG-BUSL-03Test Integrity Checks
WSTG-BUSL-04Test for Process Timing
WSTG-BUSL-05Test Number of Times a Function Can Be Used Limits
WSTG-BUSL-06Testing for the Circumvention of Work Flows
WSTG-BUSL-07Test Defenses Against Application Misuse
WSTG-BUSL-08Test Upload of Unexpected File Types
WSTG-BUSL-09Test Upload of Malicious Files
WSTG-BUSL-10Test Payment Functionality

Tool Categories

CategoryToolsPurpose
Request ManipulationBurp Repeater, Burp Intruder, mitmproxyModify request parameters, replay/reorder steps
Browser AutomationPlaywright, SeleniumMulti-step workflow testing, UI interaction
ScriptingPython requests, aiohttpCustom workflow abuse scripts, parallel requests
File Uploadcustom polyglot generators, ExifToolFile type confusion, metadata injection
Payment TestingStripe test mode, PayPal sandboxSafe payment manipulation testing

References

  • references/tools.md - Tool function signatures and parameters
  • references/workflows.md - Attack pattern definitions and test vectors

Source Transparency

This detail page is rendered from real SKILL.md content. Trust labels are metadata-based hints, not a safety guarantee.

Related Skills

Related by shared tags or category signals.

Security

pentest-ai-llm-security

No summary provided by upstream source.

Repository SourceNeeds Review
General

pentest-osint-recon

No summary provided by upstream source.

Repository SourceNeeds Review
General

pentest-mobile-app

No summary provided by upstream source.

Repository SourceNeeds Review
General

pentest-exploit-validation

No summary provided by upstream source.

Repository SourceNeeds Review