Varjinth subramaniyanmycodingjourneyy.hashnode.dev·Feb 11, 2024CSRF in Web applicationCSRF stands for Cross Site Request Forgery. It means hackers sends request to a server by using hacked person's AUTH details. When an user logged into a website, browser will store the authentication related details such as authentication token in se...Discusscsrf
YiliaforApache APISIXapisix.hashnode.dev·Jan 23, 2024What Is CSRF? How Can We Prevent CSRF?In the digital age, the Internet has woven into the fabric of our everyday lives. We've migrated numerous activities online, from shopping to socializing on various platforms and conducting banking transactions. As financial interactions become more ...Discusscsrf
Amanhekshot.hashnode.dev·Jan 19, 2024Unraveling the Anatomy of CSRF Attacks: Exploring the Trifecta of VulnerabilitiesIn the ever-evolving landscape of cybersecurity threats, Cross-Site Request Forgery (CSRF) stands out as a formidable adversary. This insidious attack vector takes advantage of three critical conditions to infiltrate web applications and compromise u...Discuss·1 likecsrf
FarahanaPronufas.hashnode.dev·Jan 7, 2024How CSRF Tokens Keep Your Website Forms Safe from Cyber ThreatsThis article highlights the significance of @csrf for website forms. @csrf is a special code used to prevent malicious activities on your website by ensuring only authorized users can submit forms or update profiles. Imagine you have a form on your ...Discuss#cybersecurity
Surabhi Sumansurabhisuman.in·Dec 18, 2023Deciphering CSRFCSRF refers to cross-site request forgery. It is an exploit on websites where an attacker is forging the identity of a trusted user to perform an action that the user didn’t intend to. Who is a trusted user? A trusted user for a website can be an aut...Discusscsrf
AM0z.hashnode.dev·Dec 8, 2023Security in web developmentIn the past, web applications were developed in isolation with little to no security, but that has changed in recent years. The world of web development has become more complex and it is important for developers to understand how to apply security me...Discuss·10 likes·32 readsSecurity
Oleksandr Lazarenkoalexlaer.hashnode.dev·Nov 21, 2023Node.js Security Unleashed: Your Ultimate Defense Guide (1/7)A Preface Nowadays, everyone acknowledges that there exists a plethora of possible attacks and exploits, each capable of employing diverse approaches to compromise a targeted system. Thankfully, a significant portion of them derives from the well-est...Discuss·2 likes·50 readsNode.js
Bhavesh Yadavcodezera.hashnode.dev·Sep 13, 2023Demystifying CSRF Tokens: Safeguarding Your Website against Sneaky Attacks!Hey there! Today, we're going to dive into the exciting world of CSRF (Cross-Site Request Forgery) tokens. They are like superheroes when it comes to protecting against CSRF attacks. But wait, what are they exactly? 🤔 Well, imagine a scenario where ...Discusscsrf
Stackzerostackzero.hashnode.dev·Aug 7, 2023How To Exploit CSRF In DVWAWe have seen a detailed description of CSRF in the introductory article, so if you didn’t, I suggest reading it.However, before going into the practical example of CSRF by exploiting DVWA, I would like to sum up this attack in a few words. CSRF stand...Discuss·1 like·116 readscsrf
Anil Vermablog.anilvermaspeaks.in·Aug 6, 2023Security & Compliance(CSRF)Cross site request forgery (CSRF), also known as XSRF, Sea Surf or Session Riding, is an attack vector that tricks a web browser into executing an unwanted action in an application to which a user is logged in. Prevention Logging off web application...Discuss·38 readscsrf