Thomas is an attacker and he skimmed through the HTML source code of an online shopping website for the presence of any vulnerabilities that he can exploit. He already knows that when a user makes any selection of items in the online shopping webpage, the selection is typically stored as form field values and sent to the application as an HTTP request (GET or POST) after clicking the Submit button. He also knows that some fields related to the selected items are modifiable by the user (like quantity, color, etc.) and some are not (like price) . While skimming through the HTML code, he identified that the price field values of the items are present in the HTML code. He modified the price field values of certain items from $200 to $2 in the HTML code and submitted the request successfully to the application. Identify the type of attack performed by Thomas on the online shopping website?
A) Session poisoning attack
B) Hidden field manipulation attack
C) HTML embedding attack
D) XML external entity attack
Correct Answer:
Verified
Q209: The penetration testing team of MirTech Inc.
Q210: Michael, a Licensed Penetration Tester, wants to
Q211: Sam was asked to conduct penetration tests
Q212: A hacker initiates so many invalid requests
Q213: Joseph, a penetration tester, was hired by
Q215: How does OS Fingerprinting help you as
Q216: Irin is a newly joined penetration tester
Q217: The purpose of a _ is to
Q218: Which of the following roles of Microsoft
Q219: Peter works as a lead penetration tester
Unlock this Answer For Free Now!
View this answer and more for free by performing one of the following actions
Scan the QR code to install the App and get 2 free unlocks
Unlock quizzes for free by uploading documents