|
You are here |
neilmadden.blog | ||
| | | | |
mathieu.fenniak.net
|
|
| | | | | Cross-site request forgery (CSRF) is a type of security exploit where a user's web browser is tricked by a third-party site into performing actions on websites that the user is logged into. It is often a difficult attack to pull off, as it requires a number of factors to line up at once. Protecting against it requires good discipline and good design practices, especially when it comes to protecting Web APIs. Here's a brief example of a fictitious CSRF attack against a bank: | |
| | | | |
www.sjoerdlangkemper.nl
|
|
| | | | | This article describes how cross site request forgery works, how sites defend against it and how to bypass these defenses. | |
| | | | |
www.securityjourney.com
|
|
| | | | | Imagine you can see through the eyes of a bank manager without them knowing. You watch as they input the security code, open the gate, and unlock the vault brimming with cash. | |
| | | | |
www.khronos.org
|
|
| | | KTX (Khronos Texture) Library and Tools. Contribute to KhronosGroup/KTX-Software development by creating an account on GitHub. | ||