You are here |
neilmadden.blog | ||
| | | |
www.sjoerdlangkemper.nl
|
|
| | | | This article describes how cross site request forgery works, how sites defend against it and how to bypass these defenses. | |
| | | |
chefsecure.com
|
|
| | | | Learn hacking with this hands-on tutorial that shows you how YouTube could be exploited if it had an XSS vulnerability. | |
| | | |
mathieu.fenniak.net
|
|
| | | | Cross-site request forgery (CSRF) is a type of security exploit where a user's web browser is tricked by a third-party site into performing actions on websites that the user is logged into. It is often a difficult attack to pull off, as it requires a number of factors to line up at once. Protecting against it requires good discipline and good design practices, especially when it comes to protecting Web APIs. Here's a brief example of a fictitious CSRF attack against a bank: | |
| | | |
blog.gsmarena.com
|
|
| |