Lab Exercise: Find 7 Business Logic Vulnerabilities

Your task is to identify seven different business logic vulnerabilities on this page. Think about how the application behaves, how data is processed, and where there might be opportunities for misuse.

If you're stuck, remember that business logic vulnerabilities often occur in areas related to data validation, session management, authentication, and privilege checks. They might also be related to processes specific to this application, like how items are added to the cart or how user searches are handled.

Once you think you've found all seven vulnerabilities, check your answers against the solutions.txt file. Good luck!


Wallet: $500

WiFi Pineapple Nano Tactical

Price: $99.99

Stock: 10

LAN Turtle

Price: $69.99

Stock: 20

Bash Bunny

Price: $99.99

Stock: 15

Rubber Ducky

Price: $44.99

Stock: 8

Packet Squirrel

Price: $79.99

Stock: 5

USB Rubber Ducky Deluxe

Price: $99.99

Stock: 12

WiFi Pineapple NANO: Tactical Elite

Price: $199.99

Stock: 25

LAN Turtle SD

Price: $99.99

Stock: 7

Rubber Ducky Deluxe

Price: $89.99

Stock: 7

Hak5 Essentials Field Kit

Price: $399.00

Stock: 3

View Cart