Attacker forces a login victim's browser to send a forged request that looks valid.
- Run OWASP CSRFTester
cd ~/workspaces/CSRFTester-1.0
java -classpath .:lib/concurrent.jar:OWASP-CSRFTester-1.0.jar org.owasp.csrftester.CSRFTester
-
Change Iceweasel's proxy to point to localhost 8008.
-
Navigate to http://localhost:8080/post.
-
Start recording in OWASP CSRFTester.
-
Submit a post.
-
Stop recording.
-
Delete any extra rows besides the post submission.
-
Change the title and content parameters to say something else.
-
Generate HTML using your preferred report type (form, iframe, img, xhr, link).
-
Notice just rending the local page submits data to Wordy Ninja Blog.
Most users don't take the time to logout of sites. Unfortunately if that site is vulnerable to a CSRF attack, it lengths the target time.
- Visit https://robinlinus.github.io/socialmedia-leak/ to determine if there are any social media sites you really don't need to be logged into right now.
- Attackers using social media (email, twitter, facebook, ads, url shortners, etc) can trick somebody into just visiting a page to do the damage.
- CSRF tokens
- Force logouts