Web application security - the fast guide Chapter 5: Attack Execution - the client | Page 8
Decompile Flash, Java applet and Silverlight
Attack requirement:
1. For successful attack
2. victim should be logged to the
sensitive website.
3. The victim should access a page on the
attacker site
Attack process
1. The attacker creates a transparent
Iframe on his page and load the page
the user logged on with sensitive
action.
2. The attacker is hiding the iframe using
JavaScript and CSS
3. The victim cannot see the overlaying
page and try to interact with the
visible page.
4. The attacker has the buttons and clicks
designed to be clicked in a sequence
that helps the attacker to execute the
malicious action on the hidden page.
2017-05-10
Web Application Security Fast Guide (book slides)
By Dr.Sami Khiami
Slide 8