Главная
Study mode:
on
1
Intro
2
What is Cross-Site Request Forgery
3
The classic example
4
More recent CSRF Attack
5
Relaxing the SOP (1)
6
Anything else? Yes, ofCORS!
7
When it's safe to fly?
8
CORS Server side headers
9
Real world CSRF attack payloads
10
Searching for CSRF exploits
11
Searching for recent CSRF exploits
12
How to prevent it?
13
SameSite - the game changer
14
So when would you need CSRF Guaru..
15
CSRF Guard flow (2)
16
What's new in CSRF Guard 4.x
17
CSRF Guard JSP Tag support
18
Conclusions and recommendations
19
Automation with nuclei templates
20
Nuclei detect CSRFGuard defaults
21
References
Description:
Explore the intricacies of Cross-Site Request Forgery (CSRF) and learn how to effectively prevent it using OWASP CSRFGuard in this comprehensive conference talk. Delve into classic examples and recent CSRF attacks, understand the implications of relaxing the Same-Origin Policy, and examine the role of CORS in web security. Discover techniques for identifying CSRF vulnerabilities, including real-world attack payloads and methods for searching for exploits. Gain insights into prevention strategies, with a focus on the game-changing SameSite attribute and its impact on CSRF protection. Examine the CSRF Guard flow and explore new features in version 4.x, including JSP Tag support. Conclude with practical recommendations and learn how to automate CSRF detection using nuclei templates. Equip yourself with the knowledge to safeguard web applications against CSRF attacks and implement robust security measures.

OWASP CSRFGuard: Understanding and Preventing Cross-Site Request Forgery

OWASP Foundation
Add to list