Page 129 - Hands-On Bug Hunting for Penetration Testers
P. 129

CSRF and Insecure Session Authentication                                    Chapter 6

                VTFS T USVTU BOE B UISFBU UP UIF DPNQBOZ T POMJOF PSEFSJOH TZTUFN BOE
                HFOFSBM CPUUPN MJOF



            Summary


            In this chapter, we covered the basics of Cross-Site Request Forgery (CSRF) as a
            vulnerability, created and validated a CSRF PoC, created a CSRF PoC programmatically,
            and successfully documented the vulnerability for a bug-report submission. Hopefully,
            you've also come away with a sense of why the bug can be so severe, and a few attack
            scenarios you can use for a future impact report.



            Questions


                   1.  What is CSRF?
                   2.  What's one possible attack scenario for a malicious actor who discovers a CSRF
                      vulnerability?
                   3.  What's the typical structure of a CSRF PoC?
                   4.  How do you use a CSRF PoC to validate a vulnerability?
                   5.  What's the advantage of using BeautifulSoup to generate HTML, as opposed to
                      raw string manipulation?
                   6.  What type of CSRF attack did we engage in for our end-to-end example?
                   7.  What kind of CSRF markup would a malicious actor use? How would it differ
                      from our PoCs? How would it be similar?


            Further Reading


            You can find out more about some of the topics we have discussed in this chapter at:

                      Additional CSRF test vulnerabilities: IUUQ   XFCTDBOUFTU DPN DTSG













                                                    [ 114 ]
   124   125   126   127   128   129   130   131   132   133   134