Web application security - the fast guide 1.1 | Page 105
Chapter 5 - Attack Execution the client
P a g e | 105
Collected information are the pay pal credentials that can be used directly to pay
for purchases.
5.16 Altering hidden fields
This type of attack focus on altering data and affecting data integrity it depends
on changing the information passed as part of request as a hidden field.
Attack requirement:
A. One or more parameter is passed as hidden field
B. The server is not checking those parameters before usage
Attack process
A. Using a proxy capture the request.
B. Alter the hidden field as required
C. Release the altered request
Example:
POST /buy/25/buy.php?prod=55 HTTP/1.1
Host: mazadme.com
Content-Type: application/x-www-form-urlencoded
Content-Length: 20
q=3&p=300
the previous listing represent a request sent from a form having the product id
as part of the request header in time where the quantity (q) and the price (p) is
sent as hidden value in the request body.
A. Using a proxy tool like (Burp Proxy) setup the proxy to intercept requests
sent by your browser.
B. Using intercept tab edit the sent header and product price (p) as required.