19.09.2017 Views

the-web-application-hackers-handbook

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

152 Chapter 5 n Bypassing Client-Side Controls<br />

to decompile, modify, and recompile a key class file and <strong>the</strong>n use JSwat to hotswap<br />

it into <strong>the</strong> running <strong>application</strong>. To use JSwat, you need to launch an applet<br />

using <strong>the</strong> appletviewer tool included in <strong>the</strong> JDK and <strong>the</strong>n connect JSwat to it.<br />

For example, you could use this command:<br />

appletviewer -J-Xdebug -J-Djava.compiler=NONE -J-<br />

Xrunjdwp:transport=dt_socket,<br />

server=y,suspend=n,address=5000 appletpage.htm<br />

Figure 5-7: Once a suitable method has been identified, JavaSnoop can be used to<br />

tamper with <strong>the</strong> return value from <strong>the</strong> method<br />

When you’re working on Silverlight objects, you can use <strong>the</strong> Silverlight Spy<br />

tool to monitor <strong>the</strong> component’s execution at runtime. This can greatly help<br />

correlate relevant code paths to events that occur within <strong>the</strong> user interface.<br />

Silverlight Spy is available from <strong>the</strong> following URL:<br />

http://firstfloorsoftware.com/SilverlightSpy/

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!