Web application security - the fast guide 1.1 | Page 95

Chapter 5 - Attack Execution the client P a g e | 95 Attack process C. Direct access to SQLlight data file using SQLlight DB browser D. Exploit the discovered data or use as base to initiate another attack. Example: Google chrome store snapshots of all visited sites (including https) in the folder C:\Users\(username)\AppData\Local\Google\Chrome\User Data\Default\top sites Thus accessing that file will enable the attacker to read and see unencrypted visited sites and image information stored in that file. A. Open SQLLight database browser (portable version is available in the supplementary materials) B. Click on browse data tab to see all the information stored in that file. 5.9 ActiveX attack ActiveX and browser extension can be very dangerous specially if it has a high privilege like memory reading or disk writing and it is half way to breaking the client machine. From the other hand browser extensions are becoming also popular and normally users tend to trust specially if it provides good service.