Anybody heard of shadow software attacks.? if so please provide some info on this. I mean how we can test this scenarion in a typical three tier architeture web related testing
I googled the term, i found one article, hope this help. http://www.astalavista.com/?section=dir&act=dnd&id=3215
Currently Working at Persistent Systems Ltd.