Leveraging web tools (e.g. Mozilla's GreaseMonkey, Firebug) to change application behavior
|Attack Pattern ID: 211 (Detailed Attack Pattern Completeness: Stub)||Typical Severity: Medium||Status: Draft|
The attacker must have installed a web tool that allows scripts or the DOM model of web-based applications to be modified before they are executed in a browser. GreaseMonkey and Firebug are two examples of such tools. The attacker must also have some understanding of the script or DOM of the client application they are modifying and how these changes will affect the server.
|Nature||Type||ID||Name||Description||View(s) this relationship pertains to|
|ChildOf||Attack Pattern||113||API Abuse/Misuse|
Mechanism of Attack (primary)1000