Web application security - the fast guide 1.1 | Page 88

Chapter 5 - Attack Execution the client P a g e | 88 5.1 Attack the client If the mapping and analysis level showed flaws on the client side it will be a good idea to begin there. The client (browser) is easily reachable by attacker and can be compromise and manipulated to initiate a full attack or partial attack as base for other types of attacks. Due to the many types of possible client attacks the coming parts will explain some possible attack execution scenario on client and examples about each type. 5.2 Two types of attacks Trickery Attacks Exploit Attacks No matter what technologies are used in attacking client side, all attacks will take one of two main types: Exploits and Trickery. In Exploit attacks a malicious code is executed on the client side and its host due to resident vulnerability and of course the countermeasure can simply be getting rid of that exploited vulnerability, from the other hand the trickery attacks are based on behavior of human operator after getting seduced by an attractive message or offer to make action that disclose important information or be used to access the information or allow the attacker to install a software that can be used later to extract data from client machine.