SlideShare a Scribd company logo
Welcome Cross Site Request Forgery (CSRF) Nikita Makeyev, CoreCommerce
* Cross Site Request Forgery * CSRF * XSRF * One-Click Attack * Session Riding Cross Site Request What?
Step 1 :
Attacker finds a website that: performs an action upon a GET request
OR
performs an action upon a POST request
but doesn't differentiate between POST
and GET data How Does It Work?
Step 2 : Attacker constructs a string that simulates
a server action request and includes it as

More Related Content

PPTX
Cross Site Scripting ( XSS)
PPTX
Reflective and Stored XSS- Cross Site Scripting
PPTX
Cross Site Scripting
PDF
Cross Site Scripting Going Beyond the Alert Box
PPTX
CSRF Attack and Its Prevention technique in ASP.NET MVC
PPTX
XSS- an application security vulnerability
PDF
Blind XSS & Click Jacking
Cross Site Scripting ( XSS)
Reflective and Stored XSS- Cross Site Scripting
Cross Site Scripting
Cross Site Scripting Going Beyond the Alert Box
CSRF Attack and Its Prevention technique in ASP.NET MVC
XSS- an application security vulnerability
Blind XSS & Click Jacking

What's hot (20)

PPTX
CROSS-SITE REQUEST FORGERY - IN-DEPTH ANALYSIS 2011
PDF
Cross site scripting
PPTX
Cross site scripting
PPTX
Cross Site Scripting(XSS)
PDF
The Cross Site Scripting Guide
KEY
Stateless Anti-Csrf
PPTX
Cross site scripting XSS
PPTX
Xss (cross site scripting)
PPTX
Cross Site Scripting (XSS)
PDF
Cross site scripting attacks and defenses
PPTX
Cross Site Scripting Defense Presentation
PDF
Web security: OWASP project, CSRF threat and solutions
PPTX
STORED XSS IN DVWA
PPTX
Cross site scripting (xss)
PPTX
Cross Site Request Forgery (CSRF) Scripting Explained
PPTX
Owasp Top 10 A3: Cross Site Scripting (XSS)
PPTX
Clickjacking DevCon2011
PPTX
Cross site scripting
PPTX
A8 cross site request forgery (csrf) it 6873 presentation
CROSS-SITE REQUEST FORGERY - IN-DEPTH ANALYSIS 2011
Cross site scripting
Cross site scripting
Cross Site Scripting(XSS)
The Cross Site Scripting Guide
Stateless Anti-Csrf
Cross site scripting XSS
Xss (cross site scripting)
Cross Site Scripting (XSS)
Cross site scripting attacks and defenses
Cross Site Scripting Defense Presentation
Web security: OWASP project, CSRF threat and solutions
STORED XSS IN DVWA
Cross site scripting (xss)
Cross Site Request Forgery (CSRF) Scripting Explained
Owasp Top 10 A3: Cross Site Scripting (XSS)
Clickjacking DevCon2011
Cross site scripting
A8 cross site request forgery (csrf) it 6873 presentation
Ad

Viewers also liked (14)

KEY
ONE Conference: Vulnerabilities in Web Applications
PDF
Defcon 20-zulla-improving-web-vulnerability-scanning
PPTX
Vulnerabilities in Web Applications
PPTX
Hudson Enterprises, Inc. Brand Optimization Service PowerPoint
PPT
Matt DeLong - Freelancer to Business Owner
PPT
Better QR Coding
PPT
Matt DeLong - PCI Compliant Ecommerce Options
PPT
Ppt fahminudin alfin is amazing ferpec universitas terbuka from indonesia
PPTX
Hudson Enterprises, Inc. Web Design PowerPoint
PPT
Identifying Cross Site Scripting Vulnerabilities in Web Applications
PPTX
Exploring web vulnerabilities
PPT
Gamification - BarCamp Jonesboro
PDF
Dltv2014 ict in schools
PPT
Top 10 Web Security Vulnerabilities (OWASP Top 10)
ONE Conference: Vulnerabilities in Web Applications
Defcon 20-zulla-improving-web-vulnerability-scanning
Vulnerabilities in Web Applications
Hudson Enterprises, Inc. Brand Optimization Service PowerPoint
Matt DeLong - Freelancer to Business Owner
Better QR Coding
Matt DeLong - PCI Compliant Ecommerce Options
Ppt fahminudin alfin is amazing ferpec universitas terbuka from indonesia
Hudson Enterprises, Inc. Web Design PowerPoint
Identifying Cross Site Scripting Vulnerabilities in Web Applications
Exploring web vulnerabilities
Gamification - BarCamp Jonesboro
Dltv2014 ict in schools
Top 10 Web Security Vulnerabilities (OWASP Top 10)
Ad

Similar to CSRF Web Vulnerabilities – Nikita Makeyev (20)

DOCX
CROSS-SITE REQUEST FORGERY - IN-DEPTH ANALYSIS 2011
PDF
Advanced xss
PPTX
Deep understanding on Cross-Site Scripting and SQL Injection
DOC
Attackers Vs Programmers
PPT
Web Application Security
PDF
A4 A K S H A Y B H A R D W A J
PPTX
webapplicationattacks-101005070110-phpapp02.pptx
PPSX
Web Security
PPT
Web Aplication Vulnerabilities
PPT
Seguridad Web by Jordan Diaz
PDF
Owasp top 10 vulnerabilities 2013
PPT
Intro to Web Application Security
PDF
xss-100908063522-phpapp02.pdf
PPT
Web Attacks - Top threats - 2010
PPT
Security Tech Talk
PPTX
Web application attacks
PPTX
Hack using firefox
PPTX
Hacking Techniques
PDF
Watch How the Giants Fall
PDF
Introduction to Cross Site Scripting ( XSS )
CROSS-SITE REQUEST FORGERY - IN-DEPTH ANALYSIS 2011
Advanced xss
Deep understanding on Cross-Site Scripting and SQL Injection
Attackers Vs Programmers
Web Application Security
A4 A K S H A Y B H A R D W A J
webapplicationattacks-101005070110-phpapp02.pptx
Web Security
Web Aplication Vulnerabilities
Seguridad Web by Jordan Diaz
Owasp top 10 vulnerabilities 2013
Intro to Web Application Security
xss-100908063522-phpapp02.pdf
Web Attacks - Top threats - 2010
Security Tech Talk
Web application attacks
Hack using firefox
Hacking Techniques
Watch How the Giants Fall
Introduction to Cross Site Scripting ( XSS )

More from Luna Web (13)

PPTX
Get More Leads Through Your Website
PDF
How to Use Your Website to Get More Leads
PPT
Neuromarketing 101 - A Primer
PPTX
It's the People Stupid. Why Story Matters to Brands.
PDF
NeuroMarketing - Intro Game Mechanics
PPT
Online Media Planning
PPT
Marketing Campaigns That Killed It (and some that didn't)
PPT
Triggers & Gamificaiton
PPT
Highlights from Search Engine Strategies, NY,NY 2011
PPT
QR Code Best Practice
PPT
"Memphis, Y U Not Use Hashtags" by: Aaron Prather
PPT
Social Networking for Training Professionals - ASTD
PPT
Social Networking Primer
Get More Leads Through Your Website
How to Use Your Website to Get More Leads
Neuromarketing 101 - A Primer
It's the People Stupid. Why Story Matters to Brands.
NeuroMarketing - Intro Game Mechanics
Online Media Planning
Marketing Campaigns That Killed It (and some that didn't)
Triggers & Gamificaiton
Highlights from Search Engine Strategies, NY,NY 2011
QR Code Best Practice
"Memphis, Y U Not Use Hashtags" by: Aaron Prather
Social Networking for Training Professionals - ASTD
Social Networking Primer

Recently uploaded (20)

PDF
The Rise and Fall of 3GPP – Time for a Sabbatical?
PDF
Per capita expenditure prediction using model stacking based on satellite ima...
PDF
Optimiser vos workloads AI/ML sur Amazon EC2 et AWS Graviton
PPTX
Digital-Transformation-Roadmap-for-Companies.pptx
PDF
Encapsulation theory and applications.pdf
PDF
Advanced methodologies resolving dimensionality complications for autism neur...
DOCX
The AUB Centre for AI in Media Proposal.docx
PPTX
20250228 LYD VKU AI Blended-Learning.pptx
PPTX
Detection-First SIEM: Rule Types, Dashboards, and Threat-Informed Strategy
PDF
TokAI - TikTok AI Agent : The First AI Application That Analyzes 10,000+ Vira...
PDF
Blue Purple Modern Animated Computer Science Presentation.pdf.pdf
PDF
Chapter 3 Spatial Domain Image Processing.pdf
PDF
Diabetes mellitus diagnosis method based random forest with bat algorithm
PPTX
VMware vSphere Foundation How to Sell Presentation-Ver1.4-2-14-2024.pptx
PPTX
Effective Security Operations Center (SOC) A Modern, Strategic, and Threat-In...
PDF
Dropbox Q2 2025 Financial Results & Investor Presentation
PDF
NewMind AI Weekly Chronicles - August'25 Week I
PDF
Review of recent advances in non-invasive hemoglobin estimation
PDF
cuic standard and advanced reporting.pdf
PDF
Unlocking AI with Model Context Protocol (MCP)
The Rise and Fall of 3GPP – Time for a Sabbatical?
Per capita expenditure prediction using model stacking based on satellite ima...
Optimiser vos workloads AI/ML sur Amazon EC2 et AWS Graviton
Digital-Transformation-Roadmap-for-Companies.pptx
Encapsulation theory and applications.pdf
Advanced methodologies resolving dimensionality complications for autism neur...
The AUB Centre for AI in Media Proposal.docx
20250228 LYD VKU AI Blended-Learning.pptx
Detection-First SIEM: Rule Types, Dashboards, and Threat-Informed Strategy
TokAI - TikTok AI Agent : The First AI Application That Analyzes 10,000+ Vira...
Blue Purple Modern Animated Computer Science Presentation.pdf.pdf
Chapter 3 Spatial Domain Image Processing.pdf
Diabetes mellitus diagnosis method based random forest with bat algorithm
VMware vSphere Foundation How to Sell Presentation-Ver1.4-2-14-2024.pptx
Effective Security Operations Center (SOC) A Modern, Strategic, and Threat-In...
Dropbox Q2 2025 Financial Results & Investor Presentation
NewMind AI Weekly Chronicles - August'25 Week I
Review of recent advances in non-invasive hemoglobin estimation
cuic standard and advanced reporting.pdf
Unlocking AI with Model Context Protocol (MCP)

CSRF Web Vulnerabilities – Nikita Makeyev

Editor's Notes

  • #2: ASK: how many freelancers? ASK: How many business owners?