Tagged articles
10 articles
Page 1 of 1
Lobster Programming
Lobster Programming
Jan 19, 2026 · Information Security

How CSRF Attacks Exploit Trusted Sessions and How to Defend Them

This article explains the principle and step‑by‑step flow of Cross‑Site Request Forgery attacks, illustrates common exploitation techniques such as forged GET/POST requests and click‑bait links, and outlines practical defenses including POST usage, HttpOnly cookies, CSRF tokens, and double‑submit cookie validation.

CSRFCross-Site Request ForgeryToken
0 likes · 6 min read
How CSRF Attacks Exploit Trusted Sessions and How to Defend Them
Liangxu Linux
Liangxu Linux
Aug 19, 2023 · Information Security

Understanding CSRF Attacks: How They Work and How to Defend Against Them

This article explains the fundamentals of Cross‑Site Request Forgery (CSRF), describing its background, attack mechanics, key concepts, common prevention techniques such as anti‑CSRF tokens and SameSite cookies, and provides practical GET and POST examples to illustrate the threat.

Anti‑CSRF TokenCSRFCross-Site Request Forgery
0 likes · 9 min read
Understanding CSRF Attacks: How They Work and How to Defend Against Them
MaGe Linux Operations
MaGe Linux Operations
Jul 27, 2023 · Information Security

Understanding CSRF Attacks: How They Work and How to Prevent Them

Cross‑Site Request Forgery (CSRF) exploits browsers’ automatic cookie handling to trick authenticated users into sending malicious requests, and this article explains its background, operation, key concepts, real‑world examples, and effective prevention techniques such as anti‑CSRF tokens and SameSite cookies.

Anti‑CSRF TokenCSRFCross-Site Request Forgery
0 likes · 9 min read
Understanding CSRF Attacks: How They Work and How to Prevent Them
Qunar Tech Salon
Qunar Tech Salon
Oct 19, 2018 · Information Security

CSRF Attacks: Mechanisms, Real‑World Examples, and Defense Strategies

This article explains the background and risks of Cross‑Site Request Forgery (CSRF) attacks, illustrates real‑world exploitation scenarios, and provides comprehensive defense techniques such as origin/referrer checks, CSRF tokens, double‑cookie verification, SameSite cookies, and best practices for developers and security teams.

CSRFCSRF tokenCross-Site Request Forgery
0 likes · 31 min read
CSRF Attacks: Mechanisms, Real‑World Examples, and Defense Strategies
Meituan Technology Team
Meituan Technology Team
Oct 11, 2018 · Information Security

Understanding CSRF Attacks and Prevention Strategies in Front-End Development

CSRF attacks trick a logged‑in user’s browser into sending authenticated requests to a target site, enabling unauthorized actions, so front‑end developers must mitigate them by enforcing same‑origin checks, using anti‑CSRF tokens or double‑cookie verification, and configuring SameSite cookie attributes to block cross‑site requests.

CSRFCross-Site Request ForgerySameSite Cookie
0 likes · 33 min read
Understanding CSRF Attacks and Prevention Strategies in Front-End Development
ITFLY8 Architecture Home
ITFLY8 Architecture Home
Mar 11, 2018 · Information Security

Understanding CSRF Attacks: Risks, Detection, and Defense Strategies

This article explains what CSRF (Cross‑Site Request Forgery) is, illustrates its attack model, details the potential damages, walks through the attack process with examples, and outlines practical detection methods and multiple defense techniques including token‑based protection and referer checks.

Anti‑CSRF TokenCSRFCross-Site Request Forgery
0 likes · 13 min read
Understanding CSRF Attacks: Risks, Detection, and Defense Strategies
ITPUB
ITPUB
Feb 25, 2018 · Information Security

How CSRF Attacks Exploit Cookies and How to Defend Against Them

This article explains the mechanics of Cross‑Site Request Forgery (CSRF) attacks—including a step‑by‑step example of password‑change exploitation—lists the four essential conditions for a successful CSRF, introduces the related Server‑Side Request Forgery (SSRF) threat, and provides practical mitigation strategies for both vulnerabilities.

Attack MitigationCSRFCross-Site Request Forgery
0 likes · 9 min read
How CSRF Attacks Exploit Cookies and How to Defend Against Them
Java High-Performance Architecture
Java High-Performance Architecture
Oct 6, 2015 · Information Security

Understanding CSRF Attacks and How to Prevent Them

This article explains how CSRF (Cross‑site request forgery) tricks authenticated users into performing attacker‑controlled actions, illustrates a typical admin‑addition scenario, and outlines two primary defenses—CAPTCHA verification and dynamic token validation—to effectively mitigate such attacks.

CSRFCaptchaCross-Site Request Forgery
0 likes · 3 min read
Understanding CSRF Attacks and How to Prevent Them