handbook/tools/3.Web-Hacking/3.Business-Logic/Authentification-Vulnerability
..
Notes