Skip to Main Content
Hack Proofing Your Web Applications
book

Hack Proofing Your Web Applications

by Syngress
June 2001
Intermediate to advanced content levelIntermediate to advanced
512 pages
18h 49m
English
Syngress
Content preview from Hack Proofing Your Web Applications
Hacking Methodology • Chapter 1 31
Cookie Poisoning
When a hacker is using “cookie poisoning,” she is usually someone who
has authorized access to the Web application in the first place.The
hacker is usually a registered customer and is familiar with the applica-
tion in question.The hacker may alter a cookie stored on her computer
and send it back to the Web site. Because the application does not
expect changes to the cookie, it may process the poisoned cookie.The
effects are usually the changing of fixed data fields, such as changing
prices on an e-commerce site or changing the identity of the user
logged in to the site—or anyone else the hacker chooses. ...
Become an O’Reilly member and get unlimited access to this title plus top books and audiobooks from O’Reilly and nearly 200 top publishers, thousands of courses curated by job role, 150+ live events each month,
and much more.
Start your free trial

You might also like

Developer's Guide to Web Application Security

Developer's Guide to Web Application Security

Michael Cross
The CERT® Oracle® Secure Coding Standard for Java™

The CERT® Oracle® Secure Coding Standard for Java™

Fred Long, Dhruv Mohindra, Robert C. Seacord, Dean F. Sutherland, David Svoboda
Troubleshooting CentOS

Troubleshooting CentOS

Jonathan Hobson

Publisher Resources

ISBN: 9781928994312