Главная
Study mode:
on
1
Intro
2
If you can predict all the parameters for an action, you can fake it
3
High Level Defenses (Design Patterns)
4
Primary Defense is the Synchronizer Token Pattern
5
Second Defensive Option is Double Submit Cookies This option used less often, but useful for things like REST
6
A Third Option is Any Form of Challenge Response System Rarely Used Exclusively for CSRF Defense
7
CSRFGuard Implements the Synchronizer Token Pattern and Makes a New Token For Each Session
8
Tomcat 7 Includes a CSRF Prevention Filter
9
F5's ASM Can Insert a Token in All Links and Forms to Implement the Synchronizer Token Pattern
10
Imperva Secure Sphere Can Detect CSRF Attacks by Checking the Referrer Header
11
CSRF Token Names Can Reveal What Library You Are Using
Description:
Explore the intricacies of Cross-Site Request Forgery (CSRF) vulnerabilities and defense mechanisms in this 45-minute OWASP Foundation talk. Gain a comprehensive understanding of CSRF, starting with its basic concepts and progressing to advanced defense strategies. Analyze the synchronizer token pattern and its various implementations across different frameworks and platforms, including .NET, Tomcat, and F5 load balancers. Examine the pros and cons of each solution, uncovering potential side effects that may impact usability or introduce new security risks. Delve into alternative approaches such as double submit cookies and challenge-response systems. Learn about OWASP CSRFGuard, Tomcat's CSRF prevention filter, and F5's Application Security Manager (ASM) capabilities. Discover how to identify CSRF token implementations based on their naming conventions and understand the implications of using specific libraries for protection.

CSRF Defense Strategies - Not All Are Created Equal

OWASP Foundation
Add to list
0:00 / 0:00