|
You are here |
mathieu.fenniak.net | ||
| | | | |
www.sjoerdlangkemper.nl
|
|
| | | | | This article describes how cross site request forgery works, how sites defend against it and how to bypass these defenses. | |
| | | | |
bogs.io
|
|
| | | | | CSRF stands for Cross-Site Request Forgery and is one of the most "popular" web application vulnerabilities | |
| | | | |
introvertmac.wordpress.com
|
|
| | | | | What is CSRF ? "Cross-site request forgery, also known as one-click attack or session riding and abbreviated as CSRF (sometimes pronounced sea-surf) or XSRF, is a type of malicious exploit of a website where unauthorized commands are transmitted from a user that the website trusts." - Wikipedia CSRF is at 8th position in OWASP... | |
| | | | |
blog.tst.sh
|
|
| | | The motivation behind this project was that I needed a very simple way for me and my friends to securely put files on my server for the various projects we use it for and the insane gigabit download speeds. Previously we just used rsync, a Linux command line utility that | ||