Web application security - the fast guide Chapter 5: Attack Execution - the client | Page 20
Direct Change to URL parameters
Attack requirement:
1. Information are passed
through parameters
embedded in the URL .
2. Wrong inputs are not well
validated
Attack process
1. This attack considered one of
the easiest attacks, it can be
mainly done without the
need of any tool but in the
worst scenario all what is
needed is:
2. Using a proxy capture the
request.
3. Alter the parameters as
requested directly from URL.
4. Release the altered request.
2017-05-10
Web Application Security Fast Guide (book slides)
By Dr.Sami Khiami
Slide 20