Test ability to forge requests
Attackers use forged requests to deliver data directly to the application’s backend for processing instead of using its frontend GUI.
The attacker attempts to submit HTTP GET
/POST
requests with data values that are not permitted, protected against, or anticipated by the business logic of the application using an intercepting proxy; in this case, OWASP ZAP. In this recipe, the attacker (you) will exploit a defect in the application’s logic to make a purchase of a leather jacket at an unanticipated cost.
Getting ready
This lab requires a PortSwigger Academy account and ZAP to be able to intercept requests and responses from the server to your browser.
How to do it…
In this section, we will be using PortSwigger Academy’s Excessive trust in client-side control lab to change the price of the product by editing the request. Please follow these instructions to complete this lab:
- Navigate to the URL with the...