This document discusses exploiting vulnerabilities in ASP.net server-side web controls. It describes how dormant or hidden server controls can still be executed to abuse application logic, even when protections like event validation and viewstate MAC are enabled. Specific attacks covered include executing events of commented out, disabled, and invisible controls by manipulating POST data. The document also outlines techniques for fingerprinting server control properties and overriding them to alter application behavior. It introduces the RIA SCIP ZAP extension for analyzing these issues and demonstrates attacks. Risk mitigation recommendations are provided focusing on secure coding practices.