parameter tampering | bug bounty hunting
parameter tampering | bug bounty hunting, available at Free, has an average rating of 3.9, with 5 lectures, based on 84 reviews, and has 3638 subscribers.
You will learn about parameter tampering business logic flows bug bounty website security This course is ideal for individuals who are bug bounty hunter and penetration tester or who want to start bug bounty It is particularly useful for bug bounty hunter and penetration tester or who want to start bug bounty.
Enroll now: parameter tampering | bug bounty hunting
Summary
Title: parameter tampering | bug bounty hunting
Price: Free
Average Rating: 3.9
Number of Lectures: 5
Number of Published Lectures: 5
Number of Curriculum Items: 5
Number of Published Curriculum Objects: 5
Original Price: Free
Quality Status: approved
Status: Live
What You Will Learn
- parameter tampering
- business logic flows
- bug bounty
- website security
Who Should Attend
- bug bounty hunter and penetration tester
- who want to start bug bounty
Target Audiences
- bug bounty hunter and penetration tester
- who want to start bug bounty
what is parameter tampering?
Parameter tampering is a simple attack targeting the application business logic. This attack takes advantage of the fact that many programmers rely on hidden or fixed fields (such as a hidden tag in a form or a parameter in a URL) as the only security measure for certain operations.
What does it mean when you do a parameter manipulation attacks?
Parameter tampering is a form of Web-based attack in which certain parameters in the Uniform Resource Locator (URL) or Web page form field data entered by a user are changed without that user’s authorization.
Detailed Description
The basic role of Web servers is to serve files. During a Web session, parameters are exchanged between the Web browser and the Web application in order to maintain information about the client’s session, eliminating the need to maintain a complex database on the server side. Parameters are passed through the use of URL query strings, form fields and cookies.
A classic example of parameter tampering is changing parameters in form fields. When a user makes selections on an HTML page, they are usually stored as form field values and sent to the Web application as an HTTP request. These values can be pre-selected (combo box, check box, radio button, etc.), free text or hidden. All of these values can be manipulated by an attacker. In most cases this is as simple as saving the page, editing the HTML and reloading the page in the Web browser.
Hidden fields are parameters invisible to the end user, normally used to provide status information to the Web application. For example, consider a products order form that includes the following hidden field:
<input type=”hidden” name=”price” value=”59.90″>
Modifying this hidden field value will cause the Web application to charge according to the new amount.
Combo boxes, check boxes and radio buttons are examples of pre-selected parameters used to transfer information between different pages, while allowing the user to select one of several predefined values. In a parameter tampering attack, an attacker may manipulate these values. For example, consider a form that includes the following combo box:
<FORM METHOD=POST ACTION=”xferMoney.asp”>
Source Account: <SELECT NAME=”SrcAcc”>
<OPTION VALUE=”123456789″>******789</OPTION>
<OPTION VALUE=”868686868″>******868</OPTION></SELECT>
<BR>Amount: <INPUT NAME=”Amount” SIZE=20>
<BR>Destination Account: <INPUT NAME=”DestAcc” SIZE=40>
<BR><INPUT TYPE=SUBMIT> <INPUT TYPE=RESET>
</FORM>
An attacker may bypass the need to choose between only two accounts by adding another account into the HTML page source code. The new combo box is displayed in the Web browser and the attacker can choose the new account.
HTML forms submit their results using one of two methods: GET or POST. If the method is GET, all form parameters and their values will appear in the query string of the next URL the user sees. An attacker may tamper with this query string. For example, consider a Web page that allows an authenticated user to select one of his/her accounts from a combo box and debit the account with a fixed unit amount. When the submit button is pressed in the Web browser, the following URL is requested:
.com/example.asp?accountnumber=12345&debitamount=1
An attacker may change the URL parameters (accountnumber and debitamount) in order to debit another account:
.com/example.asp?accountnumber=67891&creditamount=9999
There are other URL parameters that an attacker can modify, including attribute parameters and internal modules. Attribute parameters are unique parameters that characterize the behavior of the uploading page. For example, consider a content-sharing Web application that enables the content creator to modify content, while other users can only view content. The Web server checks whether the user that is accessing an entry is the author or not (usually by cookie). An ordinary user will request the following link:
.com/getpage.asp?id=77492&mode=readonly
An attacker can modify the mode parameter to readwrite in order to gain authoring permissions for the content.
Course Curriculum
Chapter 1: Introduction
Lecture 1: Introduction
Lecture 2: how to setup burpsuite
Chapter 2: parameter tampering
Lecture 1: Excessive trust in client-side controls
Lecture 2: High-level logic vulnerability
Lecture 3: Low-level logic flaw
Instructors
-
Rohel Ahmed
web security and bug bounty
Rating Distribution
- 1 stars: 8 votes
- 2 stars: 9 votes
- 3 stars: 15 votes
- 4 stars: 13 votes
- 5 stars: 39 votes
Frequently Asked Questions
How long do I have access to the course materials?
You can view and review the lecture materials indefinitely, like an on-demand channel.
Can I take my courses with me wherever I go?
Definitely! If you have an internet connection, courses on Udemy are available on any device at any time. If you don’t have an internet connection, some instructors also let their students download course lectures. That’s up to the instructor though, so make sure you get on their good side!
You may also like
- Top 10 Video Editing Courses to Learn in November 2024
- Top 10 Music Production Courses to Learn in November 2024
- Top 10 Animation Courses to Learn in November 2024
- Top 10 Digital Illustration Courses to Learn in November 2024
- Top 10 Renewable Energy Courses to Learn in November 2024
- Top 10 Sustainable Living Courses to Learn in November 2024
- Top 10 Ethical AI Courses to Learn in November 2024
- Top 10 Cybersecurity Fundamentals Courses to Learn in November 2024
- Top 10 Smart Home Technology Courses to Learn in November 2024
- Top 10 Holistic Health Courses to Learn in November 2024
- Top 10 Nutrition And Diet Planning Courses to Learn in November 2024
- Top 10 Yoga Instruction Courses to Learn in November 2024
- Top 10 Stress Management Courses to Learn in November 2024
- Top 10 Mindfulness Meditation Courses to Learn in November 2024
- Top 10 Life Coaching Courses to Learn in November 2024
- Top 10 Career Development Courses to Learn in November 2024
- Top 10 Relationship Building Courses to Learn in November 2024
- Top 10 Parenting Skills Courses to Learn in November 2024
- Top 10 Home Improvement Courses to Learn in November 2024
- Top 10 Gardening Courses to Learn in November 2024