Tagged articles
2 articles
Page 1 of 1
Qunar Tech Salon
Qunar Tech Salon
Oct 19, 2018 · Information Security

CSRF Attacks: Mechanisms, Real‑World Examples, and Defense Strategies

This article explains the background and risks of Cross‑Site Request Forgery (CSRF) attacks, illustrates real‑world exploitation scenarios, and provides comprehensive defense techniques such as origin/referrer checks, CSRF tokens, double‑cookie verification, SameSite cookies, and best practices for developers and security teams.

CSRFCSRF tokenCross-Site Request Forgery
0 likes · 31 min read
CSRF Attacks: Mechanisms, Real‑World Examples, and Defense Strategies