The scenario described involves an attacker modifying the URL parameters to alter the price of a product, which is a classic example of a Parameter Tampering attack. This type of attack occurs when an attacker manipulates parameters exchanged between client and server in order to modify application data, such as user credentials, permissions, and price of products, as seen in this case.
The original URL indicates that the product price (debit) is set to $100. The attacker has modified this parameter value to $10 in the modified URL, thus exploiting the logic validation mechanism of the e-commerce website to purchase the product at a lower price. This manipulation of parameters is indicative of a Parameter Tampering attack, which is a form of web-based attack where the properties of a web application are altered to achieve unintended outcomes by the attacker.
References: The EC-Council's Certified SOC Analyst (CSA) course material covers various types of cyber attacks, including Parameter Tampering. The CSA study guides and resources provide detailed information on how to identify and respond to such attacks, emphasizing the importance of validating and sanitizing all inputs and parameters to prevent exploitation.
