- Bug Bounty Hunting Essentials
- Carlos A. Lozano Shahmeer Amir
- 196字
- 2021-06-10 18:35:36
Why does the CSRF exist?
Let's go back to the Facebook example. Josefina is a Facebook user, and she accessed Facebook using her username and password. Facebook created a session ID, and stored it in a cookie, which is managed by Josefina's browser. A week later, Josefina accessed Facebook again, but this time, Josefina did not enter her username and password. The browser sends the session that it has in the cookie to Facebook, and Josefina could access her account.
Josefina used a game in Facebook that had an external link. This means that the business logic Josefina is interacting with does not reside in Facebook's servers. After finishing the game, Josefine came back to her account and noticed posts on her wall about Viagra. All of them were posted by her, but she did not do it. What happened?
The game played by Josefina used the information stored in the cookie to post spam on her wall. In Facebook's eyes, this is a completely valid action.
In simple terms, this is a CSRF attack, without big consequences, but just imagine the impact if an online bank, a casino, or a trading application, allowed a CSRF.
- Android應(yīng)用安全實戰(zhàn):Frida協(xié)議分析
- 網(wǎng)絡(luò)安全與管理
- Wireshark 2 Quick Start Guide
- 代碼審計:企業(yè)級Web代碼安全架構(gòu)
- 先進云安全研究與實踐
- 黑客攻防從入門到精通
- INSTANT Apple Configurator How-to
- VMware vCloud Security
- 網(wǎng)絡(luò)攻防實戰(zhàn)研究:MySQL數(shù)據(jù)庫安全
- 網(wǎng)絡(luò)入侵檢測系統(tǒng)原理與應(yīng)用
- 紅藍攻防:技術(shù)與策略(原書第3版)
- 信息組織
- ATT&CK與威脅獵殺實戰(zhàn)
- CCNA Security 210-260 Certification Guide
- ATT&CK視角下的紅藍對抗實戰(zhàn)指南