Lesson Plan Title: How to Exploit Hidden Fields
Concept / Topic To Teach:
Developers will use hidden fields for tracking, login, pricing, etc.. information on a loaded page. While this is a convenient and easy mechanism for the developer, they often don't validate the information that is received from the hidden field. This lesson will teach the attacker to find and modify hidden fields to obtain a product for a price other than the price specified
The user should be able to exploit a hidden field to obtain a product at an incorrect price.
Figure 1 Lesson 4
To change the hidden field you need to start your favorite HTTP Interceptor. You can use WebScarab from OWASP to intercept the request and change the hidden field. Configure your browser to use a local proxy. In Internet Explorer you can do this via "Tools" – "Internet Options" – "Connections" – "LAN Settings". You must define proxy "localhost" with port 8008.
Figure 2 Set local proxy in Internet Explorer
Figure 3 Intercept request with WebScarab
Figure 4 Change the Price variable to 1
Figure 5 Lesson 4 Completed
|Solution by Erwin Geirnaert|