Web application security - the fast guide Chapter 5: Attack Execution - the client | Page 16

Altering Hidden Fields Attack requirement: 1. One or more parameter is passed as hidden field 2. The server is not checking those parameters before usage Attack process 1. Using a proxy capture the request. 2. Alter the hidden field as required 3. Release the altered request 2017-05-10 Web Application Security Fast Guide (book slides) By Dr.Sami Khiami Slide 16