Главная
Study mode:
on
1
Introduction
2
CrossOrigin Requests
3
User Intended Actions
4
Countermeasures
5
Strong Secret
6
Secrets
7
Random Number Generators
8
CSRF Tokens
9
Mobile Apps
10
Passive Static Testing
11
CSRF Token Swapping
12
CrossOrigin Resource Sharing
13
Drawbacks
14
Objections
15
Browser Check
16
Content Security Policy
17
SOS
18
Syntax
19
Do Not Track
20
Set Cookie Editor
21
Cookie Policies
22
Isolated Policies
23
Default Policies
24
Exceptions
25
Origin Request
26
Demo Watch
27
SOS Policy
28
Demo
29
Behind the Scenes
30
WordPress Countermeasures
31
Social Engineering
32
Summary
33
Browsers
34
Final comments
Description:
Explore the intricacies of Cross Site Request Forgery (CSRF) attacks and countermeasures in this 47-minute Black Hat USA 2013 conference talk. Delve into the challenges of implementing effective CSRF protections and the difficulties in detecting vulnerabilities through automated tools. Learn how to model attacks to validate countermeasure effectiveness, and discover a proposed new header-based policy introducing Storage Origin Security (SOS) for cookies and session objects. Gain insights into simplifying CSRF prevention at the HTTP layer, potentially improving web security without extensive HTML modifications. Examine topics such as cross-origin requests, user-intended actions, strong secrets, CSRF tokens, mobile app considerations, and Content Security Policy. Witness demonstrations and explore real-world examples, including WordPress countermeasures and social engineering aspects.

Dissecting CSRF Attacks & Countermeasures

Black Hat
Add to list