Tag

Cross Site Request Forgery

0 views collected around this technical thread.

System Architect Go
System Architect Go
Mar 9, 2021 · Information Security

Understanding Cross‑Site Request Forgery (CSRF) and Effective Defenses

This article explains the fundamentals of Cross‑Site Request Forgery (CSRF), illustrates typical attack scenarios and payloads, and details multiple defense strategies including CSRF tokens, SameSite cookies, and best‑practice validation techniques for web.

CSRFCSRF tokenCross Site Request Forgery
0 likes · 22 min read
Understanding Cross‑Site Request Forgery (CSRF) and Effective Defenses
Qunar Tech Salon
Qunar Tech Salon
Oct 19, 2018 · Information Security

CSRF Attacks: Mechanisms, Real‑World Examples, and Defense Strategies

This article explains the background and risks of Cross‑Site Request Forgery (CSRF) attacks, illustrates real‑world exploitation scenarios, and provides comprehensive defense techniques such as origin/referrer checks, CSRF tokens, double‑cookie verification, SameSite cookies, and best practices for developers and security teams.

CSRFCSRF tokenCross Site Request Forgery
0 likes · 31 min read
CSRF Attacks: Mechanisms, Real‑World Examples, and Defense Strategies
Tencent IMWeb Frontend Team
Tencent IMWeb Frontend Team
May 30, 2016 · Information Security

Understanding CSRF: How GET Requests Can Delete Your Content and How to Defend Against It

This article explains what CSRF (Cross‑Site Request Forgery) is, demonstrates how a simple GET request can silently delete a logged‑in user's content, compares GET and POST attacks, and outlines practical defenses such as referrer checks, CAPTCHAs, and token‑based protection.

CSRFCSRF PreventionCross Site Request Forgery
0 likes · 8 min read
Understanding CSRF: How GET Requests Can Delete Your Content and How to Defend Against It