Questions tagged [tampering]

Tampering: is a process for doing Security testing of web application

At the most basic level, a test case is just a series of inputs and expected outputs. Security testing requires tweaking input in ways normally prohibited by well-behaved, normal web browsers.

Security vulnerabilities can be exploited from any type of input. We intend to take you beyond functional testing, and help you tamper with forms, files, GET, POST, AJAX, cookies, headers, and more.

This chapter suggests many ways of tampering with input and may even include common attack patterns, but does not go into detail on the most famous of web security flaws such as XSS, CSRF, and SQL Injection.

Depending on the environment you are given, you might be executing your tests against development servers, staging (i.e., pre-production ), or separate QA/testing servers. We would discourage testing against production web applications, unless you really have no alternative. Depending on which environment you’re using, you have a few pitfalls to be aware of and avoid.

If you test against development, be aware that your test environment probably does not map well to your production environment. Web servers, application servers, and the application itself.

73 questions
0
votes
3 answers

How to pass data securly between web sites?

If I have a portal which i use to access other websites. Say I have a portal A . And I wanna to access the website B. If B needs some critical info to work like username . I wanna to pass these info securely . so i make form like this : …
Anyname Donotcare
  • 11,113
  • 66
  • 219
  • 392
0
votes
1 answer

What's the Best idea to implement an Anti Connection Tampering for .Net application

what's the best way to implement an anti connection tampering for my .Net application. for example, I don't want anyone to see what my application is sending to my server.. or at least encrypt the data have been sent to the server.. I just have a…
Desolator
  • 22,411
  • 20
  • 73
  • 96
0
votes
0 answers

How to verify a private blockchain integrity?

How to verify a private blockchain integrity? How to know if a transaction or block was tampered? Is there any inherent function on Geth (the Official Go implementation of the Ethereum protocol)? Case Study: Assuming that data from a spreadsheet is…
0
votes
0 answers

How to prevent data tampering when form is set as readonly with Django?

INTRO: I have a Django web app which does the following: Allows the user to fill the form After the form is submitted, it shows the form with the previously filled values In step 2, the form fields are set as read-only because they should not be…
Federico Gentile
  • 5,650
  • 10
  • 47
  • 102
0
votes
1 answer

Protect an ionic based android application android manifest file permission

I have developed an android application using ionic angular. To protect from tampering, I have implemented obfuscation. In the VAPT testing, the application is reverse engineered and adding new permission in android manifest XML and build the apk.…
0
votes
1 answer

Is it possible to generate a read-only CSV file?

for legal reason I should let the customer be able to download a CSV file but she/he should be able only to read it, not modify it. What's a common way of handling this use case? Some kind of signature on the file so that if it's modified you can…
dierre
  • 7,140
  • 12
  • 75
  • 120
0
votes
1 answer

How to limit usage of my licensed software for customers with closed networks?

I have developed a linux desktop application which has a variable cost depending on how many "widgets" the user intends to create with my software. If they exceed that amount they need to purchase access to create more widgets. This all has to be…
btd
  • 404
  • 3
  • 12
0
votes
1 answer

Modifying HTTPS response packet on the fly with mitmproxy

I am trying to implement an mitmproxy addon script, in order to tamper with a particular https packet data - which is by the way decrypted on the fly through mitmproxy's certificate injection. I am following this Stack Overflow answer to a rather…
programmersn
  • 582
  • 1
  • 3
  • 17
0
votes
1 answer

Difference between "instruction fetch" and "data read" ?

I have a question regarding a paper I am reading right now, which is a demonstration of an attack against some tampering resistant software, using self-hashing mechanism. This kind of self hashing is working because authors are making the assumption…
Ecterion
  • 161
  • 3
  • 19
0
votes
1 answer

Security/Validation on c# property change N-Tier

I have a class that keeps track of Property Changes public class Property { object _OriginalValue; object _ProposedValue; DateTime _ProposedDateTime; List _History = new…
Watson
  • 1,385
  • 1
  • 15
  • 36
0
votes
3 answers

prevent url tampering in php

This is a test engine application with 5 papers set by me..as 5 php pages Flow of the application Login.html check.php // to check whether credentials r right if correct then main.php //user clicks on "take test" in this page which displays him…
Vinod K
  • 1,885
  • 11
  • 35
  • 45
0
votes
1 answer

Detect Javascript Tampering in Ajax call

We have a Javascript file that we have developed for our clients to use. The Javascript snippet takes a screenshot of the website it is run on and then sends it back to our server via jQuery.post() The nature of our industry means that we have to…
aaroncatlin
  • 3,203
  • 1
  • 16
  • 27
0
votes
0 answers

JSF 2.0 Form tampering by removing required input

I have a simple form in JSF like this
Joshua H
  • 754
  • 8
  • 18
0
votes
2 answers

Parameters can be tampered with before being encrypted and sent

I want to pass a value say an amount to a payment Gateway. the gate way has given me functions to make the data secure and tamper proof. the problem is im taking this amount from a text box. By using fiddler and putting a breakpoint before the…
Sujit.Warrier
  • 2,815
  • 2
  • 28
  • 47
0
votes
1 answer

tamper detection in a child process

I am developing a simple application using C and would like to know if there is any way I can detect when the application has been tampered. Based on my knowledge Hash is one way to ensure the integrity of data but I don't know how to hard-code the…
mazkopolo
  • 391
  • 1
  • 6
  • 21