5 Authorization Testing5.1 Testing Directory Traversal File Include5.2 Testing for Bypassing Authorization Schema5.3 Testing for Privilege Escalation5.4 Testing for Insecure Direct Object References5.5 Testing for OAuth Weaknesses5.5.1 Testing for OAuth Authorization Server Weaknesses5.5.2 Testing for OAuth Client Weaknesses