Questions tagged [tampering]

Tampering: is a process for doing Security testing of web application

At the most basic level, a test case is just a series of inputs and expected outputs. Security testing requires tweaking input in ways normally prohibited by well-behaved, normal web browsers.

Security vulnerabilities can be exploited from any type of input. We intend to take you beyond functional testing, and help you tamper with forms, files, GET, POST, AJAX, cookies, headers, and more.

This chapter suggests many ways of tampering with input and may even include common attack patterns, but does not go into detail on the most famous of web security flaws such as XSS, CSRF, and SQL Injection.

Depending on the environment you are given, you might be executing your tests against development servers, staging (i.e., pre-production ), or separate QA/testing servers. We would discourage testing against production web applications, unless you really have no alternative. Depending on which environment you’re using, you have a few pitfalls to be aware of and avoid.

If you test against development, be aware that your test environment probably does not map well to your production environment. Web servers, application servers, and the application itself.

71 questions
71
votes
25 answers

Detecting database tampering, is it possible?

Long time listener, first time caller. 'Say you have a database table that is responsible for logging user activity. The integrity of this log is important, so you want to be able to detect if someone has modified any data from the table. To make…
Glenn T.
  • 691
  • 5
  • 4
21
votes
2 answers

iOS - Add "objects" to existing app (jailbroken)

How do you add "objects" to an existing app ? For example, the EasyRefresh for Chrome tweak, enables a new button inside the iOS Chrome app, as do many other tweaks. How may i add a simple UIButton to, for example, the Twitter app ? Is there any…
Aleksander Azizi
  • 9,595
  • 8
  • 57
  • 86
13
votes
3 answers

How to make iOS application tamper-evident?

I am working on a project (mobile app) where I need to monitor adversary actions. So, my question is how can I make iOS app tamper-evident? e.g. Whenever any adversary try to tamper code then system should alert admin for these actions and block…
pradeep1991singh
  • 6,932
  • 3
  • 19
  • 31
8
votes
4 answers

How "tamper proof" is the $_SERVER variable in php?

Would I be taking a big security risk by trusting the content of the $_SERVER variable array to get the name of php file using $_SERVER['PHP_SELF']?
CLJ
  • 1,727
  • 5
  • 19
  • 32
7
votes
1 answer

Validator skipped when input is removed in client – is this as per JSF specification?

I have a page with an input text component marked as required="true" and having a custom Validator in server side. Now as a client, I submit the page without the HTML element rendered by that component (this can be easily achieved by removing the…
mittal
  • 190
  • 13
6
votes
5 answers

Prevent audit table tampering

We have audit table in our database. Records to this table are done using triggers. Currently, there is nothing that prevents user to log on to database server, open table from management studio and change data in audit table. What are possible…
buhtla
  • 2,489
  • 4
  • 21
  • 36
6
votes
3 answers

Tamper GET request parameter with Tamper Data in Firefox?

I am able to tamper post request parameter with Tamper Data in firefox i.e when i make post request and i get the popup in firefox to change POST request parameters but in case of GET request, i get the popup but there is no way to change the…
emilly
  • 8,688
  • 25
  • 78
  • 148
5
votes
6 answers

Is it better to store user data in a database rather than in cookies?

Why don’t we save the cookie information of website visitors (subscribers) in the database rather than setting a file on the user's machine. Yeah, I know I might sound silly for the following reasons: Maintaining database information for every…
user372551
5
votes
3 answers

Tamper with first line of URL request, in Firefox

I want to change first line of the HTTP header of my request, modifying the method and/or URL. The (excellent) Tamperdata firefox plugin allows a developer to modify the headers of a request, but not the URL itself. This latter part is what I want…
aaaidan
  • 6,422
  • 8
  • 58
  • 98
4
votes
1 answer

Rails 3 ActiveRecordStore session_id tampering

I am co-developing a simple web app in Rails 3.0.9 and I have realized that there is a possible session_id tampering possible via malicious request. Mind the fact, that this is my first RoR application, so I could be totally wrong in my…
4
votes
3 answers

Can signed executables be tampered with while retaining the integrity of the signature?

I was wondering to what degree I can rely on the digital signatures on files (aka Digital Certificates from Verisign, Simantec etc), when deciding if it's been tampered with or not. Say I want download an application version that's no longer on…
3
votes
1 answer

Cross-Site Scripting and Web Parameter Tampering prevention in Playframework

After launching our first public alpha release of http://wwww.trademango.com which is built with Play framework. I have been experience Web Parameter Tampering attempts being made by someone or something (i.e bots). These attempts has been going on…
Tahseen
  • 43
  • 1
  • 6
3
votes
1 answer

Proper usage of EncryptedSharedPreferences

Android recently released EncryptedSharedPreferences which automatically encrypts SharedPreferences key/value data. While this is good, I've found that I can simply hook onto the API call and retrieve the decrypted value. Other than encrypting the…
user1118764
  • 7,817
  • 15
  • 54
  • 94
3
votes
2 answers

Java - prevent code modification techniques

I recently heard of a software security company that makes your code hack-proof in terms of reverse engineering and code modification. Their technique is this: They insert checksums in multiple check points in the code that secure the code between…
Anonymous
  • 3,564
  • 3
  • 32
  • 56
3
votes
1 answer

Does signing an assembly or an exe with a digital certificate makes it secure against tampering attacks?

I tried creating a temporary certificate using makecert and creating a spc from the certificate using cert2spc. I signed some exe with the generated spc. I then use the binary editor in VS 2008 to flip some bits (tampered it) in the exe. To my…
Anand Patel
  • 4,993
  • 6
  • 36
  • 63
1
2 3 4 5