Blind Attacks: Understanding CSRF (Cross Site Request Forgery)by@zellwk
691 reads
691 reads

Blind Attacks: Understanding CSRF (Cross Site Request Forgery)

by Zell Liew1mJune 1st, 2022
Read on Terminal Reader
Read this story w/o Javascript
tldt arrow

Too Long; Didn't Read

A CSRF attack tricks a victim into submitting a malicious request to a website where they are authenticated** (logged in) CSRF attacks often target a state change on the server. CSRF Attacks take advantage of the fact that browsers automatically send cookies to the server in each request. The server does not implement CSRF prevention techniques (which will be discussed below) There are four prerequisites for a CSRF Attack to succeed: the user must be authenticated, the server must store authentication information in cookies.

Companies Mentioned

Mention Thumbnail
Mention Thumbnail
featured image - Blind Attacks: Understanding CSRF (Cross Site Request Forgery)
Zell Liew HackerNoon profile picture
Zell Liew

Zell Liew

@zellwk

I'm just a developer who loves to share what I discovered. I primarily write at my blog and cross-post here.

About @zellwk
LEARN MORE ABOUT @ZELLWK'S
EXPERTISE AND PLACE ON THE INTERNET.

Share Your Thoughts

About Author

Zell Liew HackerNoon profile picture
Zell Liew@zellwk
I'm just a developer who loves to share what I discovered. I primarily write at my blog and cross-post here.

TOPICS

THIS ARTICLE WAS FEATURED IN...

Permanent on Arweave
Read on Terminal Reader
Read this story in a terminal
 Terminal
Read this story w/o Javascript
Read this story w/o Javascript
 Lite
L O A D I N G
. . . comments & more!