Web application security - the fast guide 1.1 | Page 95
Chapter 5 - Attack Execution the client
P a g e | 95
Attack process
C. Direct access to SQLlight data file using SQLlight DB browser
D. Exploit the discovered data or use as base to initiate another attack.
Example:
Google chrome store snapshots of all visited sites (including https) in the
folder
C:\Users\(username)\AppData\Local\Google\Chrome\User
Data\Default\top sites
Thus accessing that file will enable the attacker to read and see unencrypted
visited sites and image information stored in that file.
A. Open SQLLight database browser (portable version is available in the
supplementary materials)
B. Click on browse data tab to see all the information stored in that file.
5.9 ActiveX attack
ActiveX and browser extension can be very dangerous specially if it has a high
privilege like memory reading or disk writing and it is half way to breaking the
client machine.
From the other hand browser extensions are becoming also popular and
normally users tend to trust specially if it provides good service.