The Server Trusts You — That's the Problem
Every time you click a button on a website — Add to Cart, Submit Order, Transfer Money — your browser sends a request behind the scenes. That request contains data: prices, quantities, user IDs, account numbers. The developer wrote the frontend to send the right values. But what happens if you change them before they arrive?
This is Parameter Tampering. You intercept the request mid-flight and edit whatever you want. If the server calculates nothing on its side and just trusts whatever you sent — you win.
In every case the attacker used no special tools. They just looked at what was being sent and changed a number. The tool we will use — the Interceptor — makes this as simple as editing a text field.
Why does parameter tampering work on vulnerable applications?
What is the attacker modifying in a parameter tampering attack?