Tagged articles
3 articles
Page 1 of 1
Liangxu Linux
Liangxu Linux
Aug 19, 2023 · Information Security

Understanding CSRF Attacks: How They Work and How to Defend Against Them

This article explains the fundamentals of Cross‑Site Request Forgery (CSRF), describing its background, attack mechanics, key concepts, common prevention techniques such as anti‑CSRF tokens and SameSite cookies, and provides practical GET and POST examples to illustrate the threat.

Anti‑CSRF TokenCSRFCross-Site Request Forgery
0 likes · 9 min read
Understanding CSRF Attacks: How They Work and How to Defend Against Them
MaGe Linux Operations
MaGe Linux Operations
Jul 27, 2023 · Information Security

Understanding CSRF Attacks: How They Work and How to Prevent Them

Cross‑Site Request Forgery (CSRF) exploits browsers’ automatic cookie handling to trick authenticated users into sending malicious requests, and this article explains its background, operation, key concepts, real‑world examples, and effective prevention techniques such as anti‑CSRF tokens and SameSite cookies.

Anti‑CSRF TokenCSRFCross-Site Request Forgery
0 likes · 9 min read
Understanding CSRF Attacks: How They Work and How to Prevent Them
ITFLY8 Architecture Home
ITFLY8 Architecture Home
Mar 11, 2018 · Information Security

Understanding CSRF Attacks: Risks, Detection, and Defense Strategies

This article explains what CSRF (Cross‑Site Request Forgery) is, illustrates its attack model, details the potential damages, walks through the attack process with examples, and outlines practical detection methods and multiple defense techniques including token‑based protection and referer checks.

Anti‑CSRF TokenCSRFCross-Site Request Forgery
0 likes · 13 min read
Understanding CSRF Attacks: Risks, Detection, and Defense Strategies