Web App Hacking: Cross-Site Request Forgery (CSRF)

This course helps to understand a Cross-Site Request Forgery attack (CSRF). You'll learn how the CSRF attack works, how severe consequences can happen as a result of this attack, and what the common problems are with the anti-CSRF implementation.
Course info
Rating
(40)
Level
Beginner
Updated
Oct 9, 2017
Duration
51m
Table of contents
Description
Course info
Rating
(40)
Level
Beginner
Updated
Oct 9, 2017
Duration
51m
Description

Cross-Site Request Forgery (CSRF) is one of the most prevalent attacks in modern web applications. In this course, Web App Hacking: Cross-Site Request Forgery (CSRF), you'll learn how to avoid the severe consequences of the CSRF attack. First, you'll discover how a CSRF attack works and how an attacker can take over a user's account with this attack. Next, you'll explore how the attacker can launch a CSRF attack as a result of insecure processing of an anti-CSRF token. Then, you'll learn how the attacker can switch a user to his account with a login CSRF attack. After that, you'll discover the importance of regeneration, and how the attacker can launch the CSRF attack when the anti-CSRF token is not regenerated at the time of authentication. Finally, you'll dive into an interesting case study of a CSRF attack. By the end of the course, you'll know how a CSRF attack works, how to test web applications for this attack, and how to prevent this attack from happening.

About the author
About the author

Dawid Czagan is listed among the Top 10 Hackers by HackerOne. He has found security vulnerabilities in Google, Yahoo, Mozilla, Microsoft, Twitter, and other companies. Due to the severity of these bugs, he has received numerous awards for his findings.

More from the author
Web App Hacking: Caching Problems
Beginner
45m
10 May 2017
More courses by Dawid Czagan
Section Introduction Transcripts
Section Introduction Transcripts

Course Overview
Hi everyone. My name is Dawid. Welcome to my course, Web App Hacking: Cross-Site Request Forgery. I am a security instructor, researcher, and buck hunter. In this course, I will discuss a Cross-Site Request Forgery attack. In short, a CSRF. You will learn how the CSRF attack works, how severe consequences can happen as a result of this attack, and what the common problems are with the anti-CSRF implementation. First, I will explain how a CSRF attack works, and I will show you how an attacker can take over a user's account with this attack. Then, I will present how the attacker can launch a CSRF attack as a result of insecure processing, often anti-CSRF token. Next, I will demonstrate how the attacker can switch a user to his account with a login CSRF attack. After that, I will discuss the importance of regeneration, and I will show you how the attacker can launch the CSRF attack when the anti-CSRF token is not regenerated at the time of authentication. And finally, I will discuss an interesting case study of a CSRF attack. By the end of the course, you will know how a CSRF attack works, how to test web applications for this attack, and how to prevent this attack from happening. I hope you will join me on this journey to learn about a Cross-Site Request Forgery attack with the Web App Hacking: Cross-Site Request Forgery course at Pluralsight.

Understanding a CSRF Attack
In this module, I will show you step by step how a CSRF attack works. First, I will explain how an attacker can change a user's email with a CSRF attack. Then I will show you a demo, and in the demo you'll see how this attack works in practice. Next, I will discuss how an attacker can take over a user's account with a CSRF attack. And finally, the countermeasure for this attack will be discussed.

Validation of an Anti-CSRF Token
In this module, I will discuss validation of an anti-CSRF token. You will see how an attacker can launch a CSRF attack as a result of insecure processing of the anti-CSRF token. As you already know from the previous module, the anti-CSRF token is used to prevent the CSRF attack from happening, but implementing the anti-CSRF token is not enough. You also have to know how to do it securely. And this is what I'll show you in this module.

Underestimated Risk: A Login CSRF Attack
In this module, I will discuss one of the most underestimated CSRF attacks, the so-called login CSRF attack. You will learn how a login CSRF attack works and how the attacker can switch a user to his account with this attack. I will also show you a demo, and in the demo you will see how the attacker can steal a user's credit card data with a login CSRF attack. And finally, the countermeasure for this attack will be discussed.

Regeneration of an Anti-CSRF Token
In this module, you will learn about the regeneration of an anti-CSRF token. First, I will tell you what the regeneration of an anti-CSRF token is, and then I will explain how the attacker can launch a CSRF attack when the anti-CSRF token is not regenerated at the time of authentication.