Lab 1.4: CSRF where token validation depends on request method | Portswigger LAB!!!
This lab's email change functionality is vulnerable to CSRF. It attempts to block CSRF attacks, but only applies defenses to certain types of requests.
To solve the lab, use your exploit server to host an HTML page that uses a CSRF attack to change the viewer's email address.
You can log in to your own account using the following credentials: wiener:peter
#techeducation #onlinesafety #digitalsafety #cybersecurityexpert #programming #linux #kalilinux #python #dataprotection #cybercrime #cybersecuritytips #ethicalhacker #pentesting #ransomware
Видео Lab 1.4: CSRF where token validation depends on request method | Portswigger LAB!!! канала Cyber Beginner
To solve the lab, use your exploit server to host an HTML page that uses a CSRF attack to change the viewer's email address.
You can log in to your own account using the following credentials: wiener:peter
#techeducation #onlinesafety #digitalsafety #cybersecurityexpert #programming #linux #kalilinux #python #dataprotection #cybercrime #cybersecuritytips #ethicalhacker #pentesting #ransomware
Видео Lab 1.4: CSRF where token validation depends on request method | Portswigger LAB!!! канала Cyber Beginner
CSRF CSRF Exploit CSRF Protection Cross-Site Request Forgery Cybersecurity Challenges Cybersecurity Tips Data Protection Ethical Hacker Ethical Hacking Exploit Server Kali Linux Learn Ethical Hacking Penetration Testing Penetration Testing Labs Security Flaws Web Application Hacking Web Application Security Web Exploits Web Security Web Security Vulnerabilities exploiting csrf network assessment portswigger lab vulnerability assessment
Комментарии отсутствуют
Информация о видео
7 декабря 2024 г. 21:06:47
00:02:31
Другие видео канала



















