About 185 results
Open links in new tab
  1. How to prevent CSRF vulnerabilities | Web Security Academy

    CSRF tokens should contain significant entropy and be strongly unpredictable, with the same properties as session tokens in general. You should use a cryptographically secure pseudo …

  2. Bypassing CSRF token validation | Web Security Academy

    CSRF vulnerabilities typically arise due to flawed validation of CSRF tokens. In this section, we'll cover some of the most common issues that enable attackers to bypass these defenses.

  3. Cross-site request forgery (CSRF) - PortSwigger

    Back to all learning paths PRACTITIONER Cross-site request forgery (CSRF) This learning path covers CSRF (Cross-Site Request Forgery). You'll learn about some common CSRF …

  4. XSS vs CSRF | Web Security Academy - PortSwigger

    In this section, we'll explain the differences between XSS and CSRF, and discuss whether CSRF tokens can help to prevent XSS attacks. What is the difference ...

  5. Bypassing SameSite cookie restrictions | Web Security Academy

    We'll then look at some of the most common ways you may be able to bypass these restrictions, enabling CSRF and other cross-site attacks on websites that may initially appear secure.

  6. Bypassing Referer-based CSRF defenses | Web Security Academy

    Aside from defenses that employ CSRF tokens, some applications make use of the HTTP Referer header to attempt to defend against CSRF attacks, normally by verifying that the request …

  7. Using Burp to Test for Cross-Site Request Forgery (CSRF)

    Burp Scanner is able to locate potential CSRF issues. The Scanner identifies a number of conditions, including when an application relies solely on HTTP cookies to identify the user, …

  8. Lab: Basic clickjacking with CSRF token protection

    This lab contains login functionality and a delete account button that is protected by a CSRF token. A user will click on elements that display the word "click" on a decoy website.

  9. OAuth 2.0 authentication vulnerabilities | Web Security Academy

    If the OAuth service fails to validate this URI properly, an attacker may be able to construct a CSRF-like attack, tricking the victim's browser into initiating an OAuth flow that will send the …

  10. Lab: CSRF where token is duplicated in cookie - PortSwigger

    It attempts to use the insecure "double submit" CSRF prevention technique. To solve the lab, use your exploit server to host an HTML page that uses a CSRF attack to change the viewer's …