19.09.2017 Views

the-web-application-hackers-handbook

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

120 Chapter 5 n Bypassing Client-Side Controls<br />

An intercepting proxy is tremendously useful when attacking a <strong>web</strong> <strong>application</strong><br />

and is <strong>the</strong> one truly indispensable tool you need. Numerous such tools are<br />

available. We will use Burp Suite, which was written by one of this book’s authors.<br />

The proxy sits between your <strong>web</strong> browser and <strong>the</strong> target <strong>application</strong>. It intercepts<br />

every request issued to <strong>the</strong> <strong>application</strong>, and every response received back,<br />

for both HTTP and HTTPS. It can trap any intercepted message for inspection<br />

or modification by <strong>the</strong> user. If you haven’t used an intercepting proxy before,<br />

you can read more about how <strong>the</strong>y function, and how to get <strong>the</strong>m configured<br />

and working, in Chapter 20.<br />

Once an intercepting proxy has been installed and suitably configured, you<br />

can trap <strong>the</strong> request that submits <strong>the</strong> form and modify <strong>the</strong> price field to any<br />

value, as shown in Figure 5-2.<br />

Figure 5-2: Modifying <strong>the</strong> values of hidden form fields using an intercepting proxy<br />

If <strong>the</strong> <strong>application</strong> processes <strong>the</strong> transaction based on <strong>the</strong> price submitted, you<br />

can purchase <strong>the</strong> product for <strong>the</strong> price of your choice.<br />

TIP If you find an <strong>application</strong> that is vulnerable in this way, see whe<strong>the</strong>r you<br />

can submit a negative amount as <strong>the</strong> price. In some cases, <strong>application</strong>s have<br />

actually accepted transactions using negative prices. The attacker receives a<br />

refund to his credit card and also <strong>the</strong> item he ordered — a win-win situation, if<br />

ever <strong>the</strong>re was one.

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!