Front end security
Professional NOUNexplainpayloadAttack codeEXPComplete vulnerability exploitation toolsPOCViewpoint verification procedure. Running this program can get the expected resultsGPCGET POST COOKIE
1. Cross site scripting attack
Cross site scripting (XSS) refers to a client-side code injection attack in which an attacker executes ...
Added by mrwutang on Thu, 03 Mar 2022 16:52:24 +0200
Basic knowledge introduction to csrf attack process
CSRF simulated attack environment (this is the Intranet environment. The public network only needs to map the port, and other operations are the same)
CentOS7 DVWA server (analog transfer system) 192.168.0.9
kali hacker (attacker) 192.168.0.2
Win10 user (vict ...
Added by lupld on Sun, 27 Feb 2022 08:20:21 +0200
CSRF (Cross Site Request Forgery), that is, cross site request forgery. The key point of launching cross site request forgery attack is to make the target server unable to distinguish whether the source of many requests is a real user or an attacker. The general process of attack is as follows: first, the attacker will induce the user to naviga ...
Added by coollog on Wed, 23 Feb 2022 12:02:46 +0200
CSRF & SSRF] - explanation of vulnerability cases - day29
1, CSRF - Cross Site Request Forgery Attack
CSRF vulnerability explanation, principle
CSRF(Cross-site request forgery)
Cross Site Request Forgery, initiated by the client, is an attack method of hijacking trusted users to send unexpected requests to the server XSS Si ...
Added by inkfish on Tue, 04 Jan 2022 11:17:00 +0200
introduceThis article describes how to rk-boot Implement the CSRF verification logic of the server.What is CSRF?Cross Site Request Forgery (English: Cross Site Request Forgery), also known as one click attack or session riding, usually abbreviated as CSRF or XSRF, is an attack method to coerce users to perform unintentional operations on the cu ...
Added by irwa82 on Sun, 26 Dec 2021 15:10:41 +0200