Web application security - the fast guide Chapter 5: Attack Execution - the client | Page 6
intercepting messages from Flash, Java applet and Silverlight
Attack requirement
1. Extension interacts with
server through Http
2. No special encryption is
used to preserve messages
confidentiality.
Flash or java applet Sends a request to
sever
Extract and
Decipher
message
Attack process
1. Capture the request
initiated by the page using a
proxy like Burp.
2. Depending on the type of
extension use the right
deciphering method to
unpack the message sent.
2017-05-10
Alter and
retransmit
message
capture and
Decipher
message
Web Application Security Fast Guide (book slides)
Send a privileged response
By Dr.Sami Khiami
Slide 6