Raul,

> Hi Taras,
> I'm not sure if Floyd purpose was this, but it is useful to play
> around the client side contraints, as they can provide a very good
> insight of what the developers implemented on the server side too.

Could you please describe it more because "to play around the client side
contraints"
is very general?

> Both contraints, client and server, should be the same, but sometimes
> they are out of sync and entry points (vulnerabilities) can be easily
> identified playing around those limits (eg. 29,30,31 for a maxlenght
> of 30).

Example with maxlenght is not good.
Such validation usually is made on JavaScript.
What should do in such situation?
My point of view is we do not need to pay so much attention to client side
*security* validation because it is not so trivial but at same time is not
main factor in validation schema.



-- 
Taras


------------------------------------------------------------------------------
Let Crystal Reports handle the reporting - Free Crystal Reports 2008 30-Day 
trial. Simplify your report design, integration and deployment - and focus on 
what you do best, core application coding. Discover what's new with
Crystal Reports now.  http://p.sf.net/sfu/bobj-july
_______________________________________________
W3af-develop mailing list
W3af-develop@lists.sourceforge.net
https://lists.sourceforge.net/lists/listinfo/w3af-develop

Reply via email to