Mitigating Parameter Tampering: Practical Insights and Solutions
jadavvineet73
91 views
27 slides
Jul 26, 2024
Slide 1 of 27
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
About This Presentation
Delve into the world of parameter tampering with our in-depth presentation. This project highlights the risks associated with manipulating request parameters and provides actionable strategies for detection and prevention. Through a series of practical labs and case studies, we demonstrate how param...
Delve into the world of parameter tampering with our in-depth presentation. This project highlights the risks associated with manipulating request parameters and provides actionable strategies for detection and prevention. Through a series of practical labs and case studies, we demonstrate how parameter tampering can undermine web application security and explore effective measures to safeguard against it. for more information visit: https://bostoninstituteofanalytics.org/cyber-security-and-ethical-hacking/
Size: 2.81 MB
Language: en
Added: Jul 26, 2024
Slides: 27 pages
Slide Content
PARAMETER TEMPERING
INDEX INTRODUCTION TYPES TOOL STEP BEFORE TEMPERING STEP AFTER TEMPERING PREVENTION
Parameter Tampering  Parameter tampering is a type of web-based cyber attack  in which certain parameters in a URL  are changed without a user's authorization. In some cases, the data entered by a user into a form field of a webpage may also be modified -- again, without the user's authorization. The attack may point the browser  to a link, page or site that the user did not intend to access.
Parameter Tampering  Parameter tampering is a type of web-based cyber attack  in which certain parameters in a URL  are changed without a user's authorization. In some cases, the data entered by a user into a form field of a webpage may also be modified -- again, without the user's authorization. The attack may point the browser  to a link, page or site that the user did not intend to access.
TYPES OF PARAMETER TEMPERING
1. Cookie Manipulation Think of cookies as the digital crumbs that track your online journey. While they generally serve for good purposes, Attackers can easily alter cookie contents and send them back to the server, a process known as Cookie Manipulation.
2. Form Fields Manipulation Forms, are not immune to manipulation. Attacker exploit this vulnerability by tweaking the information transmitted to the server via these forms..
3. URL Manipulation URLs play a crucial role in data transmission, but they can be exploited by attackers.  An attacker can intercept this URL and manipulate the debit amount, potentially causing financial chaos by altering the "1" to a much larger value.
4. HTTP Headers Manipulation: HTTP headers, accompany every request and carry essential metadata. Among these, the referrer header show the source of a request. Attackers, however, can manipulate this header to trick Server into thinking a request originates from a trusted source.Â
TOOLS
Burp Suite It is developed by the company named Portswigger , which is also the alias of its founder Dafydd Stuttard . Burp or Burp Suite is a set of tools used for penetration testing of web applications. It is the most popular tool among professional web app security researchers and bug bounty hunters. Its ease of use makes it a more suitable choice over free alternatives like OWASP ZAP.Â
STEPS TO PERFORM parameter tempering STEPS 1
STEPS TO PERFORM parameter tempering STEPS 2
STEPS TO PERFORM parameter tempering STEPS 3
STEPS TO PERFORM parameter tempering STEPS 4
STEPS TO PERFORM parameter tempering STEPS 5
STEPS TO PERFORM parameter tempering When I was checking this Iphone , I checked that price tampering is happening here. After that , I used burpsuite tool
STEPS TO PERFORM parameter tempering STEPS 1 Open burpsuite
STEPS TO PERFORM parameter tempering STEPS 2 Check the intercept of that iphone price page
STEPS TO PERFORM parameter tempering STEPS 3 change the price
STEPS TO PERFORM parameter tempering STEPS 4 Forward that page
STEPS TO PERFORM parameter tempering STEPS 5 Amount was change
STEPS TO PERFORM parameter tempering STEPS 6 Request from Payment
STEPS TO PERFORM parameter tempering STEPS 7
How to prevent parameter tampering? The following steps can help limit this vulnerability: The forms on the site should have some built-in protection Server-side validation compared with all inputs Avoid unwanted or hidden data Don’t allow interception