c# - Is there a way to hide the posted Form data when the form submit is intercepted in Burp Suite or any similar tool -


enter image description here

is there way hide keys , values posted on form submit.as these key values can tampered hacker using security testing tools such burp suite?

while https used secure data in transit, there no practical way prevent user tampering data on machine. pretty every modern browser has built-in or add-on developer tools allow user pause script execution, change client script variables, modify html, , on.

one method can used data round-tripped , forth client server , doesn't change (such userid) encrypt data prior sending, , decrypt when returns server. mechanism take of round-trip values aren't expected change , compute hash against them stored in hidden field on page. when return, recompute hash , make sure matches up. "boblimiteduser" couldn't change username "administrator" manipulating html without breaking hash.

all of being said, underlying fact should consider data coming system not under control untrusted. final input validation should performed server-side (in addition client-side validation performed). because of "double validation" requirement, complex validation routines, i'll use webservice/ajax call perform client-side validation. client script , server code can call same routine, once during , once after submission.

if take approach validate input @ both ends (so speak), tampering shouldn't issue. if boblimiteduser wants manipulate html can change dropdown value 1 value value has access to, time waste. if manages change value causes data integrity or security issues, server-side validation there protect against.

in short

  • never trust generated client script. easy manipulate (or have old script cached browser, become outdated, , break something)
  • client side validation responsiveness , usability. server side validation data integrity , security
  • don't pass sensitive information client , trust come intact. if must, use encryption protect it, or hashing validate it.
  • don't bother trying encrypt/hash stuff client-side
  • do use https protect data during transport
  • implement logging/alerting of security related errors. way, if alerts every day boblimiteduser attempting exploit app, can talk security department , either virus removed machine, or can dealt appropriately

data validation big topic of discussion, , recommend reviewing owasp reference guide (simply information replicate here): https://www.owasp.org/index.php/data_validation

one last bit think on... if have client-script application, assume using ajax , web services transmit data. regardless of client script write, prevents malicious user using fiddler bypass not client script, browser itself, send requests directly web service? way ensure security validate @ server.


Comments

Popular posts from this blog

javascript - Chart.js (Radar Chart) different scaleLineColor for each scaleLine -

apache - Error with PHP mail(): Multiple or malformed newlines found in additional_header -

java - Android – MapFragment overlay button shadow, just like MyLocation button -