SlideShare a Scribd company logo
Exploiting Parameter Tempering Attack
in Web Application
• By: Vishal Kumar (CEH | CISE | MCP)
theprohackers2017@gmail.com
Lab Scenario
• According to OWASP, the web parameter Tempering attack refers to the
manipulation of the parameters exchanged between client and server to
modify application data, such as user credentials and permission, the price
and quantity of product, and so on. Usually this information is stored in
cookies, hidden form fields, or URL query strings, and is used to increase
application functionality and control Cross-Site Scripting allow an attacker to
embed malicious JavaScript,
• HTML or Flash into a vulnerable dynamic page to trick the user into
executing the script, so that attacker can get data
• Though implementing a strict application security routine, parameters, input
validation can minimize parameter tempering and XSS vulnerabilities. Many
websites and web applications are still vulnerable to these security threats.
Lab Objective
• The objective of this lab is to help a Pen Tester learn how to
test web applications for Vulnerability of Parameter Tempering.
• This lab will demonstrate how an attacker can easily exploit para
meter tempering and can make huge damage into the web
application.
Particle Approach
• Login to your computer and open the internet explorer or the
chrome web browser.
• Perform a google search, type inurl:Profile.aspx?id= (using this
command, we are searching the link of website with the profile
page) in the google search bar and hit Enter.
• It will display some links of the websites with the profile page as
shown in the below screenshot. Open the first link.
• The website has opened with a profile page. Now have a look in
the url (i.e http://iitrindia.org/admin%20panel/profile.aspx?id=8)
of the website, the current profile is associated with the ID=8.
• lick on the url and change the value of ID=12 or any desired
number and hit Enter and let’s see the change in the page.
•
The profile has been changed as shown in the below screenshot.
• Now change the value of ID= 15, and see the result.
•
The page has been changed with a new profile as shown in the
below screenshot.
• So we can see that by making the changes directly in the url of
the link, we get the different pages or information without
performing any search on the page.
Overview of Parameter Tempering Attack
• Web Parameter Tampering attack involve the manipulation of
parameter exchanged between a client and a server to modify
application data such as user credentials and permissions,
prices, and product quantities.
Disclaimer
• The information provided in this presentation is just for
knowledge purpose. If anyone has used this knowledge for his
illegal purpose, then me and my presentation is not
responsible for that.
-Thanks
Please Like and Share this presentation, for more videos and please
subscribe my YouTube channel and like my Facebook page.
https://www.youtube.com/channel/UCcyYSi1sh1SmyMlGfB-Vq6A
https://facebook.com/prohackers2017/
http://prohackers2017.blogspot.in/
For any query and suggestion, please writes us on
theprohackers2017@gmail.com
Thanks…!!!
Ad

Recommended

Xss ppt
Xss ppt
penetration Tester
 
Sql injection attack
Sql injection attack
RajKumar Rampelli
 
Security misconfiguration
Security misconfiguration
Micho Hayek
 
Deep understanding on Cross-Site Scripting and SQL Injection
Deep understanding on Cross-Site Scripting and SQL Injection
Vishal Kumar
 
Introduction to Web Application Penetration Testing
Introduction to Web Application Penetration Testing
Anurag Srivastava
 
Parameter tampering
Parameter tampering
Dilan Warnakulasooriya
 
Introduction to path traversal attack
Introduction to path traversal attack
Prashant Hegde
 
Vulnerabilities in modern web applications
Vulnerabilities in modern web applications
Niyas Nazar
 
Session7-XSS & CSRF
Session7-XSS & CSRF
zakieh alizadeh
 
Sqlite
Sqlite
Raghu nath
 
Cross site scripting (xss) attacks issues and defense - by sandeep kumbhar
Cross site scripting (xss) attacks issues and defense - by sandeep kumbhar
Sandeep Kumbhar
 
SQL INJECTION
SQL INJECTION
Anoop T
 
Cross site scripting (xss)
Cross site scripting (xss)
Manish Kumar
 
Waf bypassing Techniques
Waf bypassing Techniques
Avinash Thapa
 
Directory Traversal & File Inclusion Attacks
Directory Traversal & File Inclusion Attacks
Raghav Bisht
 
Cross site scripting (xss)
Cross site scripting (xss)
Ritesh Gupta
 
SSRF workshop
SSRF workshop
Ivan Novikov
 
XSS
XSS
Hrishikesh Mishra
 
Hacking web applications
Hacking web applications
Adeel Javaid
 
User authentication
User authentication
CAS
 
Sqlmap
Sqlmap
Rushikesh Kulkarni
 
Understanding Cross-site Request Forgery
Understanding Cross-site Request Forgery
Daniel Miessler
 
Security Testing Training With Examples
Security Testing Training With Examples
Alwin Thayyil
 
CNIT 123 8: Desktop and Server OS Vulnerabilities
CNIT 123 8: Desktop and Server OS Vulnerabilities
Sam Bowne
 
MySQL Security
MySQL Security
Ted Wennmark
 
Blazor - the successor of angular/react/vue?
Blazor - the successor of angular/react/vue?
Robert Szachnowski
 
Express JS Rest API Tutorial
Express JS Rest API Tutorial
Simplilearn
 
Intro to Web Application Security
Intro to Web Application Security
Rob Ragan
 
Mitigating Parameter Tampering: Practical Insights and Solutions
Mitigating Parameter Tampering: Practical Insights and Solutions
Boston Institute of Analytics
 
webapplicationattacks-101005070110-phpapp02.pptx
webapplicationattacks-101005070110-phpapp02.pptx
SyedAliShahid3
 

More Related Content

What's hot (20)

Session7-XSS & CSRF
Session7-XSS & CSRF
zakieh alizadeh
 
Sqlite
Sqlite
Raghu nath
 
Cross site scripting (xss) attacks issues and defense - by sandeep kumbhar
Cross site scripting (xss) attacks issues and defense - by sandeep kumbhar
Sandeep Kumbhar
 
SQL INJECTION
SQL INJECTION
Anoop T
 
Cross site scripting (xss)
Cross site scripting (xss)
Manish Kumar
 
Waf bypassing Techniques
Waf bypassing Techniques
Avinash Thapa
 
Directory Traversal & File Inclusion Attacks
Directory Traversal & File Inclusion Attacks
Raghav Bisht
 
Cross site scripting (xss)
Cross site scripting (xss)
Ritesh Gupta
 
SSRF workshop
SSRF workshop
Ivan Novikov
 
XSS
XSS
Hrishikesh Mishra
 
Hacking web applications
Hacking web applications
Adeel Javaid
 
User authentication
User authentication
CAS
 
Sqlmap
Sqlmap
Rushikesh Kulkarni
 
Understanding Cross-site Request Forgery
Understanding Cross-site Request Forgery
Daniel Miessler
 
Security Testing Training With Examples
Security Testing Training With Examples
Alwin Thayyil
 
CNIT 123 8: Desktop and Server OS Vulnerabilities
CNIT 123 8: Desktop and Server OS Vulnerabilities
Sam Bowne
 
MySQL Security
MySQL Security
Ted Wennmark
 
Blazor - the successor of angular/react/vue?
Blazor - the successor of angular/react/vue?
Robert Szachnowski
 
Express JS Rest API Tutorial
Express JS Rest API Tutorial
Simplilearn
 
Intro to Web Application Security
Intro to Web Application Security
Rob Ragan
 
Cross site scripting (xss) attacks issues and defense - by sandeep kumbhar
Cross site scripting (xss) attacks issues and defense - by sandeep kumbhar
Sandeep Kumbhar
 
SQL INJECTION
SQL INJECTION
Anoop T
 
Cross site scripting (xss)
Cross site scripting (xss)
Manish Kumar
 
Waf bypassing Techniques
Waf bypassing Techniques
Avinash Thapa
 
Directory Traversal & File Inclusion Attacks
Directory Traversal & File Inclusion Attacks
Raghav Bisht
 
Cross site scripting (xss)
Cross site scripting (xss)
Ritesh Gupta
 
Hacking web applications
Hacking web applications
Adeel Javaid
 
User authentication
User authentication
CAS
 
Understanding Cross-site Request Forgery
Understanding Cross-site Request Forgery
Daniel Miessler
 
Security Testing Training With Examples
Security Testing Training With Examples
Alwin Thayyil
 
CNIT 123 8: Desktop and Server OS Vulnerabilities
CNIT 123 8: Desktop and Server OS Vulnerabilities
Sam Bowne
 
Blazor - the successor of angular/react/vue?
Blazor - the successor of angular/react/vue?
Robert Szachnowski
 
Express JS Rest API Tutorial
Express JS Rest API Tutorial
Simplilearn
 
Intro to Web Application Security
Intro to Web Application Security
Rob Ragan
 

Similar to Exploiting parameter tempering attack in web application (20)

Mitigating Parameter Tampering: Practical Insights and Solutions
Mitigating Parameter Tampering: Practical Insights and Solutions
Boston Institute of Analytics
 
webapplicationattacks-101005070110-phpapp02.pptx
webapplicationattacks-101005070110-phpapp02.pptx
SyedAliShahid3
 
Ceh v8 labs module 13 hacking web applications
Ceh v8 labs module 13 hacking web applications
Mehrdad Jingoism
 
IRJET- Bug Hunting using Web Application Penetration Testing Techniques.
IRJET- Bug Hunting using Web Application Penetration Testing Techniques.
IRJET Journal
 
Web application vulnerability assessment
Web application vulnerability assessment
Ravikumar Paghdal
 
Secure Coding BSSN Semarang Material.pdf
Secure Coding BSSN Semarang Material.pdf
nanangAris1
 
AnitaB-Atlanta-CyberSecurity-Weekend-Rana-Khalil.pdf
AnitaB-Atlanta-CyberSecurity-Weekend-Rana-Khalil.pdf
sk0894308
 
Xfocus xcon 2008_aks_oknock
Xfocus xcon 2008_aks_oknock
ownerkhan
 
Web Application Penetration Testing Introduction
Web Application Penetration Testing Introduction
gbud7
 
Analysis of web application penetration testing
Analysis of web application penetration testing
Engr Md Yusuf Miah
 
Url manipulation
Url manipulation
Shivam Singh
 
Web Application Penetration Testing
Web Application Penetration Testing
Priyanka Aash
 
Introduction to Web Application Penetration Testing
Introduction to Web Application Penetration Testing
Rana Khalil
 
Attacking Web Applications
Attacking Web Applications
Sasha Goldshtein
 
Exploiting HTML Injection: A Comprehensive Proof of Concept
Exploiting HTML Injection: A Comprehensive Proof of Concept
Boston Institute of Analytics
 
Romulus OWASP
Romulus OWASP
Grupo Gesfor I+D+i
 
Top Ten Web Hacking Techniques (2008)
Top Ten Web Hacking Techniques (2008)
Jeremiah Grossman
 
Common Web Application Attacks
Common Web Application Attacks
Ahmed Sherif
 
Web Application Security
Web Application Security
Srivigneshwar R Prasad
 
CNIT 129S: Ch 4: Mapping the Application
CNIT 129S: Ch 4: Mapping the Application
Sam Bowne
 
Mitigating Parameter Tampering: Practical Insights and Solutions
Mitigating Parameter Tampering: Practical Insights and Solutions
Boston Institute of Analytics
 
webapplicationattacks-101005070110-phpapp02.pptx
webapplicationattacks-101005070110-phpapp02.pptx
SyedAliShahid3
 
Ceh v8 labs module 13 hacking web applications
Ceh v8 labs module 13 hacking web applications
Mehrdad Jingoism
 
IRJET- Bug Hunting using Web Application Penetration Testing Techniques.
IRJET- Bug Hunting using Web Application Penetration Testing Techniques.
IRJET Journal
 
Web application vulnerability assessment
Web application vulnerability assessment
Ravikumar Paghdal
 
Secure Coding BSSN Semarang Material.pdf
Secure Coding BSSN Semarang Material.pdf
nanangAris1
 
AnitaB-Atlanta-CyberSecurity-Weekend-Rana-Khalil.pdf
AnitaB-Atlanta-CyberSecurity-Weekend-Rana-Khalil.pdf
sk0894308
 
Xfocus xcon 2008_aks_oknock
Xfocus xcon 2008_aks_oknock
ownerkhan
 
Web Application Penetration Testing Introduction
Web Application Penetration Testing Introduction
gbud7
 
Analysis of web application penetration testing
Analysis of web application penetration testing
Engr Md Yusuf Miah
 
Web Application Penetration Testing
Web Application Penetration Testing
Priyanka Aash
 
Introduction to Web Application Penetration Testing
Introduction to Web Application Penetration Testing
Rana Khalil
 
Attacking Web Applications
Attacking Web Applications
Sasha Goldshtein
 
Exploiting HTML Injection: A Comprehensive Proof of Concept
Exploiting HTML Injection: A Comprehensive Proof of Concept
Boston Institute of Analytics
 
Top Ten Web Hacking Techniques (2008)
Top Ten Web Hacking Techniques (2008)
Jeremiah Grossman
 
Common Web Application Attacks
Common Web Application Attacks
Ahmed Sherif
 
CNIT 129S: Ch 4: Mapping the Application
CNIT 129S: Ch 4: Mapping the Application
Sam Bowne
 
Ad

More from Vishal Kumar (20)

Threat Hunting Procedures and Measurement Matrice
Threat Hunting Procedures and Measurement Matrice
Vishal Kumar
 
The Complete Questionnaires About Firewall
The Complete Questionnaires About Firewall
Vishal Kumar
 
E-mail Security Protocol - 2 Pretty Good Privacy (PGP)
E-mail Security Protocol - 2 Pretty Good Privacy (PGP)
Vishal Kumar
 
E-Mail Security Protocol - 1 Privacy Enhanced Mail (PEM) Protocol
E-Mail Security Protocol - 1 Privacy Enhanced Mail (PEM) Protocol
Vishal Kumar
 
Privileges Escalation by Exploiting Client-Side Vulnerabilities Using Metasploit
Privileges Escalation by Exploiting Client-Side Vulnerabilities Using Metasploit
Vishal Kumar
 
Exploiting Client-Side Vulnerabilities and Establishing a VNC Session
Exploiting Client-Side Vulnerabilities and Establishing a VNC Session
Vishal Kumar
 
Auditing System Password Using L0phtcrack
Auditing System Password Using L0phtcrack
Vishal Kumar
 
Dumping and Cracking SAM Hashes to Extract Plaintext Passwords
Dumping and Cracking SAM Hashes to Extract Plaintext Passwords
Vishal Kumar
 
Fundamental of Secure Socket Layer (SSL) | Part - 2
Fundamental of Secure Socket Layer (SSL) | Part - 2
Vishal Kumar
 
The Fundamental of Electronic Mail (E-mail)
The Fundamental of Electronic Mail (E-mail)
Vishal Kumar
 
Fundamental of Secure Socket Layer (SSl) | Part - 1
Fundamental of Secure Socket Layer (SSl) | Part - 1
Vishal Kumar
 
The Fundamental of Secure Socket Layer (SSL)
The Fundamental of Secure Socket Layer (SSL)
Vishal Kumar
 
Hawkeye the Credential Theft Maalware
Hawkeye the Credential Theft Maalware
Vishal Kumar
 
Owasp top 10 security threats
Owasp top 10 security threats
Vishal Kumar
 
Mirroring web site using ht track
Mirroring web site using ht track
Vishal Kumar
 
Collecting email from the target domain using the harvester
Collecting email from the target domain using the harvester
Vishal Kumar
 
Information gathering using windows command line utility
Information gathering using windows command line utility
Vishal Kumar
 
Introduction ethical hacking
Introduction ethical hacking
Vishal Kumar
 
Social engineering
Social engineering
Vishal Kumar
 
Social engineering
Social engineering
Vishal Kumar
 
Threat Hunting Procedures and Measurement Matrice
Threat Hunting Procedures and Measurement Matrice
Vishal Kumar
 
The Complete Questionnaires About Firewall
The Complete Questionnaires About Firewall
Vishal Kumar
 
E-mail Security Protocol - 2 Pretty Good Privacy (PGP)
E-mail Security Protocol - 2 Pretty Good Privacy (PGP)
Vishal Kumar
 
E-Mail Security Protocol - 1 Privacy Enhanced Mail (PEM) Protocol
E-Mail Security Protocol - 1 Privacy Enhanced Mail (PEM) Protocol
Vishal Kumar
 
Privileges Escalation by Exploiting Client-Side Vulnerabilities Using Metasploit
Privileges Escalation by Exploiting Client-Side Vulnerabilities Using Metasploit
Vishal Kumar
 
Exploiting Client-Side Vulnerabilities and Establishing a VNC Session
Exploiting Client-Side Vulnerabilities and Establishing a VNC Session
Vishal Kumar
 
Auditing System Password Using L0phtcrack
Auditing System Password Using L0phtcrack
Vishal Kumar
 
Dumping and Cracking SAM Hashes to Extract Plaintext Passwords
Dumping and Cracking SAM Hashes to Extract Plaintext Passwords
Vishal Kumar
 
Fundamental of Secure Socket Layer (SSL) | Part - 2
Fundamental of Secure Socket Layer (SSL) | Part - 2
Vishal Kumar
 
The Fundamental of Electronic Mail (E-mail)
The Fundamental of Electronic Mail (E-mail)
Vishal Kumar
 
Fundamental of Secure Socket Layer (SSl) | Part - 1
Fundamental of Secure Socket Layer (SSl) | Part - 1
Vishal Kumar
 
The Fundamental of Secure Socket Layer (SSL)
The Fundamental of Secure Socket Layer (SSL)
Vishal Kumar
 
Hawkeye the Credential Theft Maalware
Hawkeye the Credential Theft Maalware
Vishal Kumar
 
Owasp top 10 security threats
Owasp top 10 security threats
Vishal Kumar
 
Mirroring web site using ht track
Mirroring web site using ht track
Vishal Kumar
 
Collecting email from the target domain using the harvester
Collecting email from the target domain using the harvester
Vishal Kumar
 
Information gathering using windows command line utility
Information gathering using windows command line utility
Vishal Kumar
 
Introduction ethical hacking
Introduction ethical hacking
Vishal Kumar
 
Social engineering
Social engineering
Vishal Kumar
 
Social engineering
Social engineering
Vishal Kumar
 
Ad

Recently uploaded (20)

Code Profiling in Odoo 18 - Odoo 18 Slides
Code Profiling in Odoo 18 - Odoo 18 Slides
Celine George
 
Hurricane Helene Application Documents Checklists
Hurricane Helene Application Documents Checklists
Mebane Rash
 
2025 June Year 9 Presentation: Subject selection.pptx
2025 June Year 9 Presentation: Subject selection.pptx
mansk2
 
ENGLISH_Q1_W1 PowerPoint grade 3 quarter 1 week 1
ENGLISH_Q1_W1 PowerPoint grade 3 quarter 1 week 1
jutaydeonne
 
List View Components in Odoo 18 - Odoo Slides
List View Components in Odoo 18 - Odoo Slides
Celine George
 
OBSESSIVE COMPULSIVE DISORDER.pptx IN 5TH SEMESTER B.SC NURSING, 2ND YEAR GNM...
OBSESSIVE COMPULSIVE DISORDER.pptx IN 5TH SEMESTER B.SC NURSING, 2ND YEAR GNM...
parmarjuli1412
 
Paper 106 | Ambition and Corruption: A Comparative Analysis of ‘The Great Gat...
Paper 106 | Ambition and Corruption: A Comparative Analysis of ‘The Great Gat...
Rajdeep Bavaliya
 
K12 Tableau User Group virtual event June 18, 2025
K12 Tableau User Group virtual event June 18, 2025
dogden2
 
Q1_TLE 8_Week 1- Day 1 tools and equipment
Q1_TLE 8_Week 1- Day 1 tools and equipment
clairenotado3
 
HistoPathology Ppt. Arshita Gupta for Diploma
HistoPathology Ppt. Arshita Gupta for Diploma
arshitagupta674
 
A Visual Introduction to the Prophet Jeremiah
A Visual Introduction to the Prophet Jeremiah
Steve Thomason
 
IIT KGP Quiz Week 2024 Sports Quiz (Prelims + Finals)
IIT KGP Quiz Week 2024 Sports Quiz (Prelims + Finals)
IIT Kharagpur Quiz Club
 
English 3 Quarter 1_LEwithLAS_Week 1.pdf
English 3 Quarter 1_LEwithLAS_Week 1.pdf
DeAsisAlyanajaneH
 
How to use search fetch method in Odoo 18
How to use search fetch method in Odoo 18
Celine George
 
NSUMD_M1 Library Orientation_June 11, 2025.pptx
NSUMD_M1 Library Orientation_June 11, 2025.pptx
Julie Sarpy
 
THE PSYCHOANALYTIC OF THE BLACK CAT BY EDGAR ALLAN POE (1).pdf
THE PSYCHOANALYTIC OF THE BLACK CAT BY EDGAR ALLAN POE (1).pdf
nabilahk908
 
June 2025 Progress Update With Board Call_In process.pptx
June 2025 Progress Update With Board Call_In process.pptx
International Society of Service Innovation Professionals
 
LAZY SUNDAY QUIZ "A GENERAL QUIZ" JUNE 2025 SMC QUIZ CLUB, SILCHAR MEDICAL CO...
LAZY SUNDAY QUIZ "A GENERAL QUIZ" JUNE 2025 SMC QUIZ CLUB, SILCHAR MEDICAL CO...
Ultimatewinner0342
 
Tanja Vujicic - PISA for Schools contact Info
Tanja Vujicic - PISA for Schools contact Info
EduSkills OECD
 
Peer Teaching Observations During School Internship
Peer Teaching Observations During School Internship
AjayaMohanty7
 
Code Profiling in Odoo 18 - Odoo 18 Slides
Code Profiling in Odoo 18 - Odoo 18 Slides
Celine George
 
Hurricane Helene Application Documents Checklists
Hurricane Helene Application Documents Checklists
Mebane Rash
 
2025 June Year 9 Presentation: Subject selection.pptx
2025 June Year 9 Presentation: Subject selection.pptx
mansk2
 
ENGLISH_Q1_W1 PowerPoint grade 3 quarter 1 week 1
ENGLISH_Q1_W1 PowerPoint grade 3 quarter 1 week 1
jutaydeonne
 
List View Components in Odoo 18 - Odoo Slides
List View Components in Odoo 18 - Odoo Slides
Celine George
 
OBSESSIVE COMPULSIVE DISORDER.pptx IN 5TH SEMESTER B.SC NURSING, 2ND YEAR GNM...
OBSESSIVE COMPULSIVE DISORDER.pptx IN 5TH SEMESTER B.SC NURSING, 2ND YEAR GNM...
parmarjuli1412
 
Paper 106 | Ambition and Corruption: A Comparative Analysis of ‘The Great Gat...
Paper 106 | Ambition and Corruption: A Comparative Analysis of ‘The Great Gat...
Rajdeep Bavaliya
 
K12 Tableau User Group virtual event June 18, 2025
K12 Tableau User Group virtual event June 18, 2025
dogden2
 
Q1_TLE 8_Week 1- Day 1 tools and equipment
Q1_TLE 8_Week 1- Day 1 tools and equipment
clairenotado3
 
HistoPathology Ppt. Arshita Gupta for Diploma
HistoPathology Ppt. Arshita Gupta for Diploma
arshitagupta674
 
A Visual Introduction to the Prophet Jeremiah
A Visual Introduction to the Prophet Jeremiah
Steve Thomason
 
IIT KGP Quiz Week 2024 Sports Quiz (Prelims + Finals)
IIT KGP Quiz Week 2024 Sports Quiz (Prelims + Finals)
IIT Kharagpur Quiz Club
 
English 3 Quarter 1_LEwithLAS_Week 1.pdf
English 3 Quarter 1_LEwithLAS_Week 1.pdf
DeAsisAlyanajaneH
 
How to use search fetch method in Odoo 18
How to use search fetch method in Odoo 18
Celine George
 
NSUMD_M1 Library Orientation_June 11, 2025.pptx
NSUMD_M1 Library Orientation_June 11, 2025.pptx
Julie Sarpy
 
THE PSYCHOANALYTIC OF THE BLACK CAT BY EDGAR ALLAN POE (1).pdf
THE PSYCHOANALYTIC OF THE BLACK CAT BY EDGAR ALLAN POE (1).pdf
nabilahk908
 
LAZY SUNDAY QUIZ "A GENERAL QUIZ" JUNE 2025 SMC QUIZ CLUB, SILCHAR MEDICAL CO...
LAZY SUNDAY QUIZ "A GENERAL QUIZ" JUNE 2025 SMC QUIZ CLUB, SILCHAR MEDICAL CO...
Ultimatewinner0342
 
Tanja Vujicic - PISA for Schools contact Info
Tanja Vujicic - PISA for Schools contact Info
EduSkills OECD
 
Peer Teaching Observations During School Internship
Peer Teaching Observations During School Internship
AjayaMohanty7
 

Exploiting parameter tempering attack in web application

  • 1. Exploiting Parameter Tempering Attack in Web Application • By: Vishal Kumar (CEH | CISE | MCP) [email protected]
  • 2. Lab Scenario • According to OWASP, the web parameter Tempering attack refers to the manipulation of the parameters exchanged between client and server to modify application data, such as user credentials and permission, the price and quantity of product, and so on. Usually this information is stored in cookies, hidden form fields, or URL query strings, and is used to increase application functionality and control Cross-Site Scripting allow an attacker to embed malicious JavaScript, • HTML or Flash into a vulnerable dynamic page to trick the user into executing the script, so that attacker can get data • Though implementing a strict application security routine, parameters, input validation can minimize parameter tempering and XSS vulnerabilities. Many websites and web applications are still vulnerable to these security threats.
  • 3. Lab Objective • The objective of this lab is to help a Pen Tester learn how to test web applications for Vulnerability of Parameter Tempering. • This lab will demonstrate how an attacker can easily exploit para meter tempering and can make huge damage into the web application.
  • 4. Particle Approach • Login to your computer and open the internet explorer or the chrome web browser. • Perform a google search, type inurl:Profile.aspx?id= (using this command, we are searching the link of website with the profile page) in the google search bar and hit Enter. • It will display some links of the websites with the profile page as shown in the below screenshot. Open the first link.
  • 5. • The website has opened with a profile page. Now have a look in the url (i.e http://iitrindia.org/admin%20panel/profile.aspx?id=8) of the website, the current profile is associated with the ID=8.
  • 6. • lick on the url and change the value of ID=12 or any desired number and hit Enter and let’s see the change in the page. • The profile has been changed as shown in the below screenshot.
  • 7. • Now change the value of ID= 15, and see the result. • The page has been changed with a new profile as shown in the below screenshot.
  • 8. • So we can see that by making the changes directly in the url of the link, we get the different pages or information without performing any search on the page.
  • 9. Overview of Parameter Tempering Attack • Web Parameter Tampering attack involve the manipulation of parameter exchanged between a client and a server to modify application data such as user credentials and permissions, prices, and product quantities.
  • 10. Disclaimer • The information provided in this presentation is just for knowledge purpose. If anyone has used this knowledge for his illegal purpose, then me and my presentation is not responsible for that. -Thanks
  • 11. Please Like and Share this presentation, for more videos and please subscribe my YouTube channel and like my Facebook page. https://www.youtube.com/channel/UCcyYSi1sh1SmyMlGfB-Vq6A https://facebook.com/prohackers2017/ http://prohackers2017.blogspot.in/ For any query and suggestion, please writes us on [email protected] Thanks…!!!