Загрузка...

CSRF Attack Demo - How I Changed My Role to Admin Without Logging In | Web Exploits Series #3

In this ethical hacking demo, I walk you through how a CSRF (Cross-Site Request Forgery) attack can silently escalate a regular user account to an admin role — without the user doing anything.

💡 What you’ll learn:

How CSRF works behind the scenes

How session cookies are exploited

How to simulate a CSRF role change with a fake HTML attack page

How to defend your website from CSRF vulnerabilities

⚠️ Educational purposes only — do not attempt this on real websites!

📁 Project: CSRF Admin Role Change
🎯 Tools: PHP, XAMPP, Chrome
📽️ Recorded with OBS Studio

🔐 Stay tuned for Part 4: Session Hijacking

Видео CSRF Attack Demo - How I Changed My Role to Admin Without Logging In | Web Exploits Series #3 канала Grae-X Labs
Яндекс.Метрика

На информационно-развлекательном портале SALDA.WS применяются cookie-файлы. Нажимая кнопку Принять, вы подтверждаете свое согласие на их использование.

Об использовании CookiesПринять