Web application security - the fast guide 1.1 | Page 94

Chapter 5 - Attack Execution the client P a g e | 94 Example: A. An example is pushing the victim to purchase a product from a site without his knowledge. B. The victim is logged in to the ecommerce site. C. The attacker creates a fake page that has the same layout with the first catalogue. D. The attacker loads the first catalogue in a hidden iframe using the CSS opacity property. E. The victim clicks the button on the fake page. F. The user purchases the product specially if he has the one click purchase activated on default payment method. 5.8 client SQLlight Figure 36: SQL Light DB Browser Recently and as part of HTML5 specification local storage DOM Storage were used to store local information Attacker can access data stored as JavaScript, this object uses an underlying sqllight data base on the client machine. Any unencrypted contents can be viewed through sql light database browser. SQLLight data can come of one of two sources the first is local stored info by a specific application or those created automatically by the browser. Attack requirement: Store data are not encrypted Attacker has access to client machine.