Web application security - the fast guide Chapter 5: Attack Execution - the client | Page 4
Altering cookies
Attack requirement:
A. Existence of a cookie used
to store state information
B. The used cookie is used
directly without being
checked by the server.
Attack process
A. Using a proxy capture the
request or the response
writing the cookie.
B. Alter the cookie value after
intercepting request or
response.
C. Release the altered request
or response.
2017-05-10
Send a request to sever
Intercept
request with
Burp
Send a response with legitimate
cookie
Alter and
retransmit
Write altered cookie on the client
Send Altered cookie with privileged value to sever
Send a privileged response
Web Application Security Fast Guide (book slides)
By Dr.Sami Khiami
Slide 4