~Publication ~
^ I hope - You gotcha ^
Hashtag for this session
#BitzNightTesting , #CSRF
: Twitter handle for feedback :
@weekendtesting @Abhinav_Sejpal
G+
http://goo.gl/kMAOs1
Install XAMPP
Acronym for:
Client Side language : HTML & Javascript
Server side Language: PHP
DB : MYSQL
Why PHP ? - Any answer Here?
OWASP A8 - CSRF
Facebook Post
Linkedin Panel
' Send Request '
Proxy (Man in the middle)
Intercept Request & Respond from client
Login ID - admin
password - adminpass
HTTP GET Request
<html>
<title> CSRF Demo 1 </title>
Click me </a>
</html>
ssh, No!!
Would you like to write CSRF exploit without click ??
CSRF GET Request with Image Tag
<html>
<title> CSRF Demo 1 </title>
</html>
<iframe
src="http://127.0.0.1/xampp/mutillidae/index.php?do=logout"></iframe>
<script> var X= new Image();
X.src= "http://127.0.0.1/xampp/mutillidae/index.php?do=logout";
No - you should try out
IronWASP
* One Click POC *
* Hybrid automation *
Add user with out admin knowledge
CSRF & XSRF
Update the user info. without their knowledge
http://testphp.vulnweb.com/userinfo.php
You've been CSRF'd with static token!
Can we exploit this with Level #2 ?There is no silver bullet to stop this - Just Trust your code
~ Keep Hacking your Code ~Facebook CSRF worth USD 5000 by Amol
Google Account display pic deletion
Facebook Account deactivation
Advance Leanings - CSRF Token Validation Fail
Thank-you http://garage4hackers.com/ community
Feel free to write me at bug.wrangler at outlook.com
https://slides.com/abhinavsejpal/weekend-testing-csrf
copyrights 2013-2014 Abhinav Sejpal
-----
Attribution-NonCommercial-NoDerivs 3.0 Unported
Dedicated to my lovely daddy