Web application security - the fast guide 1.1 | Page 158

Chapter 8 - Attack Tools P a g e | 158 8.1 Browsers The web browser can be itself a hacking tool, as you saw in the attack execution chapter lot of attacks can be done simply using the browser by tampering the URL or entering malicious data in the input fields as in SQL injection or elevation of privilege attack. An example might be changing the value of (accountType) to (platinum in a vulnerable page that does not recheck the hidden field information which will allow the attacker to gain platinum account benefits. A disadvantages actually exist in the usage of the browser related to the emended neutralizing and sanitization capabilities added to the new versions of browsers that might prevent many potential traditional attacks. 8.2 Browser’s Extensions Another effective set of hacking tools are available as extensions for browsers which make it transparent and easy to use. Another important cause that makes the usage of extensions Examples about those extensions are: