Understanding Cross-Site Request Forgery
Understanding Cross-Site Request Forgery
Introduction
⚫ Understanding the CSRF Vulnerability
⚫ Methodology
⚫ Impact
⚫ Mitigations
Pre-Requirements
⚫Cookies:- Cookies are arbitrary pieces of data, usually
chosen and first sent by the web server, and stored on
the client computer by the web browser
⚫Session ID :-session ID or session token is a piece of
data that is used in network communications to
identify a session, a series of related message
exchanges. Session identifiers become necessary in
cases where the communications infrastructure uses a
stateless protocol such as HTTP.
⚫SOP(Same-Origin Policy) :-In this policy, a web
browser permits scripts contained in a first web page to
access data in a second web page, but only if both web
pages have the same origin.
What is CSRF?
⚫Cross-Site Request Forgery (CSRF) is an attack that
forces an end user to execute unwanted actions on a
web application in which they’re currently
authenticated.(owasp)
⚫It allows an attacker to partly circumvent the same
origin policy, which is designed to prevent different
websites from interfering with each other.
CSRF Attacks
⚫CSRF is stand for Cross-Site Request Forgery.
⚫In a successful CSRF attack, the attacker causes the
victim user to carry out an action unintentionally.
How CSRF work?
⚫Related action