Web application security - the fast guide Chapter 5: Attack Execution - the client | Page 17
Hashed Hidden Fields
OR
67fdg43098743mazxcd445
Regenerate another based on algorithm
discloser
67fdg43098743mazxcd445
Encrypted hidden field
67fdg43098743mazxcd445
Containing account number
Copied from another account
Attack requirement:
1. One or more parameter is passed as hidden field
2. The server is not checking those parameters before usage
Attack process
1. Using a proxy capture the request.
2. Alter the hidden field as required
3. Release the altered request
2017-05-10
Web Application Security Fast Guide (book slides)
By Dr.Sami Khiami
Slide 17