The Web Application Hacker’s Handbook Discovering and Exploiting Security Flaws



Download 5,76 Mb.
Pdf ko'rish
bet171/875
Sana01.01.2022
Hajmi5,76 Mb.
#293004
1   ...   167   168   169   170   171   172   173   174   ...   875
Bog'liq
3794 1008 4334

Figure 5-1:  A typical HTML form

96

Chapter 5 



Bypassing Client-Side Controls

70779c05.qxd:WileyRed  9/16/07  5:14 PM  Page 96



The code behind this form is as follows:


Product: Sony VAIO A217S

Quantity:






Notice the form field called 

price

, which is flagged as hidden. This field will



be sent to the server when the user submits the form:

POST /order.asp HTTP/1.1

Host: wahh-app.com

Content-Length: 23

quantity=1&price=1224.95

Now, although the 

price

field is not displayed on-screen, and it is not



editable by the user, this is solely because the application has instructed the

browser to hide the field. Because everything that occurs on the client side is

ultimately within the user’s control, this restriction can be circumvented in

order to edit the price.

One way to achieve this is to save the source code for the HTML page, edit

the value of the field, reload the source into a browser, and click the Buy but-

ton. However, a more elegant and easier method is to use an intercepting

proxy to modify the desired data on the fly.

An intercepting proxy is tremendously useful when attacking a web appli-

cation and is the one truly indispensable tool that you need in your arsenal.

There are numerous such tools available, but the most functional and popu-

lar are:


■■

Burp Proxy (part of Burp Suite)

■■

WebScarab



■■

Paros


The proxy sits between your web browser and the target application. It

intercepts every request issued to the application, and every response received

back, for both HTTP and HTTPS. It can trap any intercepted message for

inspection or modification by the user. The proxies listed also have numerous

advanced functions to make your job easier, including:

■■

Fine-grained rules to control which messages are trapped.



■■

Regex-based replacement of message content.




Download 5,76 Mb.

Do'stlaringiz bilan baham:
1   ...   167   168   169   170   171   172   173   174   ...   875




Ma'lumotlar bazasi mualliflik huquqi bilan himoyalangan ©hozir.org 2024
ma'muriyatiga murojaat qiling

kiriting | ro'yxatdan o'tish
    Bosh sahifa
юртда тантана
Боғда битган
Бугун юртда
Эшитганлар жилманглар
Эшитмадим деманглар
битган бодомлар
Yangiariq tumani
qitish marakazi
Raqamli texnologiyalar
ilishida muhokamadan
tasdiqqa tavsiya
tavsiya etilgan
iqtisodiyot kafedrasi
steiermarkischen landesregierung
asarlaringizni yuboring
o'zingizning asarlaringizni
Iltimos faqat
faqat o'zingizning
steierm rkischen
landesregierung fachabteilung
rkischen landesregierung
hamshira loyihasi
loyihasi mavsum
faolyatining oqibatlari
asosiy adabiyotlar
fakulteti ahborot
ahborot havfsizligi
havfsizligi kafedrasi
fanidan bo’yicha
fakulteti iqtisodiyot
boshqaruv fakulteti
chiqarishda boshqaruv
ishlab chiqarishda
iqtisodiyot fakultet
multiservis tarmoqlari
fanidan asosiy
Uzbek fanidan
mavzulari potok
asosidagi multiservis
'aliyyil a'ziym
billahil 'aliyyil
illaa billahil
quvvata illaa
falah' deganida
Kompyuter savodxonligi
bo’yicha mustaqil
'alal falah'
Hayya 'alal
'alas soloh
Hayya 'alas
mavsum boyicha


yuklab olish