Tagged articles
4 articles
Page 1 of 1
Liangxu Linux
Liangxu Linux
Aug 19, 2023 · Information Security

Understanding CSRF Attacks: How They Work and How to Defend Against Them

This article explains the fundamentals of Cross‑Site Request Forgery (CSRF), describing its background, attack mechanics, key concepts, common prevention techniques such as anti‑CSRF tokens and SameSite cookies, and provides practical GET and POST examples to illustrate the threat.

Anti‑CSRF TokenCSRFCross-Site Request Forgery
0 likes · 9 min read
Understanding CSRF Attacks: How They Work and How to Defend Against Them
MaGe Linux Operations
MaGe Linux Operations
Jul 27, 2023 · Information Security

Understanding CSRF Attacks: How They Work and How to Prevent Them

Cross‑Site Request Forgery (CSRF) exploits browsers’ automatic cookie handling to trick authenticated users into sending malicious requests, and this article explains its background, operation, key concepts, real‑world examples, and effective prevention techniques such as anti‑CSRF tokens and SameSite cookies.

Anti‑CSRF TokenCSRFCross-Site Request Forgery
0 likes · 9 min read
Understanding CSRF Attacks: How They Work and How to Prevent Them
Qunar Tech Salon
Qunar Tech Salon
Oct 19, 2018 · Information Security

CSRF Attacks: Mechanisms, Real‑World Examples, and Defense Strategies

This article explains the background and risks of Cross‑Site Request Forgery (CSRF) attacks, illustrates real‑world exploitation scenarios, and provides comprehensive defense techniques such as origin/referrer checks, CSRF tokens, double‑cookie verification, SameSite cookies, and best practices for developers and security teams.

CSRFCSRF tokenCross-Site Request Forgery
0 likes · 31 min read
CSRF Attacks: Mechanisms, Real‑World Examples, and Defense Strategies
Meituan Technology Team
Meituan Technology Team
Oct 11, 2018 · Information Security

Understanding CSRF Attacks and Prevention Strategies in Front-End Development

CSRF attacks trick a logged‑in user’s browser into sending authenticated requests to a target site, enabling unauthorized actions, so front‑end developers must mitigate them by enforcing same‑origin checks, using anti‑CSRF tokens or double‑cookie verification, and configuring SameSite cookie attributes to block cross‑site requests.

CSRFCross-Site Request ForgerySameSite Cookie
0 likes · 33 min read
Understanding CSRF Attacks and Prevention Strategies in Front-End Development