- Bug Bounty Hunting Essentials
- Carlos A. Lozano Shahmeer Amir
- 149字
- 2021-06-10 18:35:36
GET CSRF
The applications could call the methods using an HTTP GET request. In this case, you will see when an external resource will be called in the HTTP proxy. It is important to pay attention to the information sent by the HTTP headers, because all of the parameters sent in the request could be used by the method, for example:
https://www.mysocialnetwork.com/process.php?from=rick&to=morty&credits=10008000
In this URL, we can see that the application is sending all of the parameters directly. So, we do not need any additional parameters; the important thing is to execute the request. To do that, the most common method is to include the request in an <img> tag without the user knowing it, for example, in an external website:
<img src=" https://www.mysocialnetwork.com/process.php?from=rick&to=morty&credits=10008000">
The result is that when the <img> tag is parsed by the browser, the request is made, and the attack is executed. You can use other tags, even JavaScript.
- Android應(yīng)用安全實(shí)戰(zhàn):Frida協(xié)議分析
- Practical Network Scanning
- 網(wǎng)絡(luò)空間安全:管理者讀物
- Preventing Digital Extortion
- ARM匯編與逆向工程:藍(lán)狐卷·基礎(chǔ)知識(shí)
- 安全防御入門(mén)手冊(cè)
- CTF那些事兒
- 網(wǎng)絡(luò)服務(wù)安全與監(jiān)控
- 隱私計(jì)算:推進(jìn)數(shù)據(jù)“可用不可見(jiàn)”的關(guān)鍵技術(shù)
- 網(wǎng)絡(luò)安全實(shí)戰(zhàn)詳解(企業(yè)專(zhuān)供版)
- 云計(jì)算安全防護(hù)技術(shù)
- 計(jì)算機(jī)網(wǎng)絡(luò)安全實(shí)驗(yàn)指導(dǎo)
- 聯(lián)邦學(xué)習(xí)原理與算法
- ATT&CK與威脅獵殺實(shí)戰(zhàn)
- Instant OSSEC Host-based Intrusion Detection System