tulpa · @tulpa
524 followers · 481 posts · Server fosstodon.org

I guess that if the only thing I log into in my mobile browser is my feed reader, I don't have too much to fear there about or . Nobody is going to attack it, because there's no value in it. And it can't be used to steal anything else, because there isn't anything else.

#xss #csrf

Last updated 1 year ago

Igor Warneck ✓ · @igorwarneck
356 followers · 1544 posts · Server nrw.social

Was ist ein Token in Bezug auf - da kommt immer so ne Fehlermeldung im Chrome Fenster.

#csrf #mastodon

Last updated 1 year ago

Sending POST data to a Django view via AJAX to a REST endpoint - anjane.sh/csrf -

#django #python #javascript #csrf #rest

Last updated 1 year ago

nosh :fosstodon: · @nosherwan
418 followers · 3031 posts · Server fosstodon.org

📺
I am assuming Linus Tech Tips youtube hack was CSRF:

So Linus says one of the staff's session token was hijacked via dodgy email, I think this is classic CSRF.

However he mentions session token.

I am wondering what is the difference between session token & an access token, because in this case logically they are the same.

If so it seems http only cookies are not that secure, what is the alternative then?

youtu.be/yGXaAWbzl5A




#linustechtips #csrf #cookies #youtube

Last updated 1 year ago

Robert von Burg :vegan: :tux: · @eitch
63 followers · 677 posts · Server mstdn.gsi.li

Dear community. If my app doesn't use cookies, then am i right in understanding that it is not susceptible to attacks? Authorization would be done through a Authorization header with a token stored in the clients session and/or local storage

And if it did have a cookie, then would a SameSite=Strict mitigate this?

#InfoSec #csrf

Last updated 1 year ago

F5 DevCentral · @DevCentral
15 followers · 19 posts · Server infosec.exchange

Cross-Site Request Forgery is an attack vector in which the victim is lured to click on a malicious link attempting a fraudulent operation on that sensitive site. Ted Byerly shows How To Protect Your Applications from with F5 Distributed Cloud community.f5.com/t5/technical-

#csrf

Last updated 2 years ago

stribika · @stribika
28 followers · 107 posts · Server infosec.exchange

infosec.exchange/@VidmoOreda/1

"These sort of browser security mechanisms (i.e., SameSite cookies, Fetch metadata) are meant to be defense-in-depth only." < They cannot be serious, SameSite is _the_ solution to .

#csrf

Last updated 2 years ago

Sharing the last experiences my teams and I had with a Strong Cross-Site Request Forgery (CSRF) unauthorised access case concerning on one of our customer portals and how we managed to resolve this issue.

blog.mailixa.io/cross-site-req

#php #jquery #csrf #xss #cors #howto #blog #hashnode

Last updated 2 years ago

Redbeard · @redbeardsec
15 followers · 67 posts · Server infosec.exchange
Elias Labastida · @TheCS_Student
6 followers · 11 posts · Server mastodon.au

is like when someone else gets a hold of your account and starts doing stuff without your knowledge, like buying stuff online or changing your password.

medium.com/@TheCS_student/expl

#csrf #hacking #cybersec #cybersecuritytips #pentest #pentesting #infosecurity #infosec

Last updated 2 years ago

Astra Kernel :verified: · @AstraKernel
786 followers · 817 posts · Server infosec.exchange

🪲 Interesting article on CSRF attack that bypasses CSRF defence

▶️ Practical Example Of Client Side Path Manipulation - post by @aroly

erasec.be/blog/client-side-pat

#csrf #appsec #bugbounty #bugbountytips #redteam #infosec

Last updated 2 years ago

Astra Kernel · @AstraKernel
98 followers · 144 posts · Server infosec.exchange
· @jfkimmes
11 followers · 31 posts · Server mastodon.online

Am I misunderstanding Firefox's state partitioning (developer.mozilla.org/en-US/do)?

It seems like it would make CSRF tokens obsolete? But everybody is still talking about the SameSite attribute against CSRF?

#cookies #web #csrf

Last updated 2 years ago

magikh0e :valid: · @magikh0e
145 followers · 157 posts · Server infosec.exchange

Before reporting , try turning it into an RCE

-XSS? try making an chain with

Persistent , chain with

#bugbountytip #ssrf #self #exploit #clickjacking #xss #csrf

Last updated 2 years ago

Ron Bowes · @iagox86
861 followers · 123 posts · Server infosec.exchange

I'm excited to share of my work that came out today! Specifically, a handful of vulnerabilities in devices that I worked on through the summer, and worked with the vendor to get patched (F5 was awesome to work with, btw!).

I wrote a super detailed #blog post, and also wrote a full PoC. modules (both for the exploits and some post-exploitation data-gathering) are incoming as well!

The most important of the issues is via a vulnerability in the interface (), which is pretty cool (though requires a confluence of conditions to actually matter). I also had to bypass to actually exploit this on the path I chose, which is kinda cool.

The other is authenticated RCE, to which they assigned , though even I, the person who found it, doesn't really think it's a big deal. It's a nice way to get a session on your test box, at least?

I also published a bunch of my #tools for analyzing F5, including scripts to build, parse, and requests to their proprietary (I think?) database protocol (these require a valid login to use, but there's no user separation so there's a bit of ).

I'll also be speaking about this research in much more detail (as much as I can in 45 minutes :) ) in my talk on Dec 2!

#f5 #BIGIP #blog #metasploit #rce #csrf #soap #cve_2022_41622 #selinux #cve_2022_41800 #meterpreter #tools #mitm #LPE #Hushcon

Last updated 2 years ago

Ron Bowes · @iagox86
861 followers · 123 posts · Server infosec.exchange

Has anybody written a module to exploit a vulnerability?

I need to make one, but there are considerations: do I display some sorta user-provided template? Do I submit the form with JavaScript? Do I try to be sneaky?

#metasploit #csrf

Last updated 2 years ago

With web design skills like this, who wouldn't want to hire me :ablobcool:​ In all seriousness though, this was a simple little HTML-only page (I added CSS for flair :black_sparkles:​) that I created for my Security for Software Developers course lab with the purpose of successfully attacking a locally hosted instance of a fake bank using Cross-Site Request Forgery, and "withdrawing" some amount from that users account if they happen to click my button while still logged into the fake bank on another tab. The other attack I made was using a page with a form that I made hidden, that would pass the parameters to the bank withdrawal page and submit the form automatically using a couple lines of JavaScript.

#infosec #csrf #webdevelopment #securesoftwaredevelopment #netbeans #informationsecurity #secdevops

Last updated 2 years ago

ITSEC News · @itsecbot
687 followers · 32461 posts · Server schleuss.online