HOME > IT & Software > parameter tampering - bug bounty hunting

parameter tampering - bug bounty hunting

Synopsisparameter tampering | bug bounty hunting, available at Free,...
parameter tampering - bug bounty hunting  No.1

parameter tampering | bug bounty hunting, available at Free, has an average rating of 3.9, with 5 lectures, based on 84 reviews, and has 3638 subscribers.

You will learn about parameter tampering business logic flows bug bounty website security This course is ideal for individuals who are bug bounty hunter and penetration tester or who want to start bug bounty It is particularly useful for bug bounty hunter and penetration tester or who want to start bug bounty.

Enroll now: parameter tampering | bug bounty hunting

Summary

Title: parameter tampering | bug bounty hunting

Price: Free

Average Rating: 3.9

Number of Lectures: 5

Number of Published Lectures: 5

Number of Curriculum Items: 5

Number of Published Curriculum Objects: 5

Original Price: Free

Quality Status: approved

Status: Live

What You Will Learn

  • parameter tampering
  • business logic flows
  • bug bounty
  • website security
  • Who Should Attend

  • bug bounty hunter and penetration tester
  • who want to start bug bounty
  • Target Audiences

  • bug bounty hunter and penetration tester
  • who want to start bug bounty
  • what is parameter tampering?

    Parameter tampering is a simple attack targeting the application business logic. This attack takes advantage of the fact that many programmers rely on hidden or fixed fields (such as a hidden tag in a form or a parameter in a URL) as the only security measure for certain operations.

    What does it mean when you do a parameter manipulation attacks?

    Parameter tampering is a form of Web-based attack in which certain parameters in the Uniform Resource Locator (URL) or Web page form field data entered by a user are changed without that user’s authorization.

    Detailed Description

    The basic role of Web servers is to serve files. During a Web session, parameters are exchanged between the Web browser and the Web application in order to maintain information about the client’s session, eliminating the need to maintain a complex database on the server side. Parameters are passed through the use of URL query strings, form fields and cookies.

    A classic example of parameter tampering is changing parameters in form fields. When a user makes selections on an HTML page, they are usually stored as form field values and sent to the Web application as an HTTP request. These values can be pre-selected (combo box, check box, radio button, etc.), free text or hidden. All of these values can be manipulated by an attacker. In most cases this is as simple as saving the page, editing the HTML and reloading the page in the Web browser.

    Hidden fields are parameters invisible to the end user, normally used to provide status information to the Web application. For example, consider a products order form that includes the following hidden field:

    <input type=”hidden” name=”price” value=”59.90″>

    Modifying this hidden field value will cause the Web application to charge according to the new amount.

    Combo boxes, check boxes and radio buttons are examples of pre-selected parameters used to transfer information between different pages, while allowing the user to select one of several predefined values. In a parameter tampering attack, an attacker may manipulate these values. For example, consider a form that includes the following combo box:

    <FORM METHOD=POST ACTION=”xferMoney.asp”>
    Source Account: <SELECT NAME=”SrcAcc”>
    <OPTION VALUE=”123456789″>******789</OPTION>
    <OPTION VALUE=”868686868″>******868</OPTION></SELECT>
    <BR>Amount: <INPUT NAME=”Amount” SIZE=20>
    <BR>Destination Account: <INPUT NAME=”DestAcc” SIZE=40>
    <BR><INPUT TYPE=SUBMIT> <INPUT TYPE=RESET>
    </FORM>

    An attacker may bypass the need to choose between only two accounts by adding another account into the HTML page source code. The new combo box is displayed in the Web browser and the attacker can choose the new account.

    HTML forms submit their results using one of two methods: GET or POST. If the method is GET, all form parameters and their values will appear in the query string of the next URL the user sees. An attacker may tamper with this query string. For example, consider a Web page that allows an authenticated user to select one of his/her accounts from a combo box and debit the account with a fixed unit amount. When the submit button is pressed in the Web browser, the following URL is requested:

    .com/example.asp?accountnumber=12345&debitamount=1

    An attacker may change the URL parameters (accountnumber and debitamount) in order to debit another account:

    .com/example.asp?accountnumber=67891&creditamount=9999

    There are other URL parameters that an attacker can modify, including attribute parameters and internal modules. Attribute parameters are unique parameters that characterize the behavior of the uploading page. For example, consider a content-sharing Web application that enables the content creator to modify content, while other users can only view content. The Web server checks whether the user that is accessing an entry is the author or not (usually by cookie). An ordinary user will request the following link:

    .com/getpage.asp?id=77492&mode=readonly

    An attacker can modify the mode parameter to readwrite in order to gain authoring permissions for the content.

    Course Curriculum

    Chapter 1: Introduction

    Lecture 1: Introduction

    Lecture 2: how to setup burpsuite

    Chapter 2: parameter tampering

    Lecture 1: Excessive trust in client-side controls

    Lecture 2: High-level logic vulnerability

    Lecture 3: Low-level logic flaw

    Instructors

  • parameter tampering - bug bounty hunting  No.2
    Rohel Ahmed
    web security and bug bounty
  • Rating Distribution

  • 1 stars: 8 votes
  • 2 stars: 9 votes
  • 3 stars: 15 votes
  • 4 stars: 13 votes
  • 5 stars: 39 votes
  • Frequently Asked Questions

    How long do I have access to the course materials?

    You can view and review the lecture materials indefinitely, like an on-demand channel.

    Can I take my courses with me wherever I go?

    Definitely! If you have an internet connection, courses on Udemy are available on any device at any time. If you don’t have an internet connection, some instructors also let their students download course lectures. That’s up to the instructor though, so make sure you get on their good side!