SlideShare a Scribd company logo
1 of 20
๏‚ž What is Cross Site Request Forgery 
๏‚ž Cross Site Request Forgery Vulnerability 
๏‚ž Which Websites are Vulnerable 
๏‚ž How the CSRF works โ€“ โ€œRiding the Sessionโ€ 
๏‚ž Example Attack Scenario 
๏‚ž CSRF Mitigation Best Practices: 
โ€บ For the End User 
โ€บ For Applications 
๏‚ž Misconceptions about CSRF โ€“ Defenses That Donโ€™t Work 
๏‚ž CSRF Myths and Reality 
๏‚ž How to Prevent CSRF
A Cross Site Request Forgery (CSRF) โ€“ the โ€œsleeping giantโ€, is an 
attack that forces a logged-on victimโ€™s browser to send a forged HTTP 
request, including the victimโ€™s session cookie and any other 
automatically included authentication information, to a vulnerable 
web application. This allows the attacker to force the victimโ€™s browser 
to generate requests the vulnerable application thinks are legitimate 
requests from the victim.
Cross-site request forgery, is also known as 
a one-click attack or session riding and 
abbreviated as CSRF ("sea-surf") or XSRF, is 
a type of malicious exploit of a website 
whereby unauthorized commands are 
transmitted from a user that the website 
trusts. ...โ€
The seed for CSRF vulnerability goes back 25 
years agoโ€ฆto the birth of Internet and world 
wide web. 
The Bad people have all the time in the world, 
and they need to be successful only once, 
but the enforcement teams have to be 
successful 100% of the time.
Cross-site request forgery vulnerabilities exploit the trust that a 
Web Application has on the Client Browser: 
๏‚ž Exploits a users privileges and trust to a particular Website. 
๏‚ž Exploits the trust that applications have on authenticated 
sessions. 
๏‚ž It is a Client Side(Browser) attack. 
Identifying the attacker is even more difficult as the attack 
occurs in the context of the authenticated user!
๏‚ž The key characteristic of a CSRF vulnerability are that the application 
accepts a request that makes something occur on the server and the 
attacker can determine all the parameters of that request for another 
user. 
๏‚ž Not to be confused with Cross Site Scripting! In Cross Site Scripting (XSS), 
the attacker exploits the trust a user has for a website, with CSRF on the 
other hand, the attacker exploits the trust a website has against a userโ€™s 
browser. 
๏‚ž CSRF Involves two key components to be successful: 
โ€บ A willing victim (this cannot be controlled) 
โ€บ A vulnerable website (this can be controlled)
๏‚ž Checking whether an application is vulnerable is by seeing if any links and 
forms lack an unpredictable CSRF token. Without such a token, attackers 
can forge malicious requests. 
๏‚ž An alternate defense is to require the user to prove they intended to submit 
the request, either through re-authentication, or some other proof they are a 
real user (e.g., a CAPTCHA). 
๏‚ž Also, important is focusing on the links and forms that invoke state-changing 
functions, since those are the most important CSRF targets. 
๏‚ž The multistep transactions should be also checked, as they are not inherently 
immune. Attackers can easily forge a series of requests by using multiple tags 
or possibly JavaScript. 
๏‚ž Session cookies, source IP addresses, and other information automatically 
sent by the browser donโ€™t provide any defense against CSRF since this 
information is also included in forged requests.
๏‚ž Websites that has not taken specific steps to mitigate the 
risks of CSRF attacks are most like vulnerable. 
๏‚ž Every piece of sensitive website functionality is vulnerable 
๏‚ž According to Open Web Application Security Project 
(OWASP): โ€œCross Site request forgery is not a new attack, but 
is simple and devastating.." This vulnerability is extremely 
widespread.." " all web application frameworks are 
vulnerable to CSRFโ€
๏‚ž HTTP is a Stateless Protocol, Web Applications maintains state through 
SessionID (in Cookies or URL Parameters, Hidden variables) 
๏‚ž The Server Trusts the SessionID coming from the browser. 
๏‚ž For authenticated sessions , the browser does not resend a NEW SessionID to 
the application as a proof that each HTTP request is authenticated 
๏‚ž This allow for โ€œriding the sessionโ€ with an interleaved malicious HTTP request. 
๏‚ž If an attacker phish a victim forcing him to select a web page (via web mail 
for example) that has a malicious HTML tag such as iframe with an 
embedded GET request and if such request is issued (by the victim web 
page selection) when an authenticated session with the same application is 
still valid, then such malicious request will processed by the application.
๏‚ž The Web application (server) implicitly assumes that any request that comes in 
expresses the will of the user, as it comes from the users browser. 
๏‚ž The Application does not take into account that the request may as well have been 
foisted on the user by a third party. 
๏‚ž Is this the web applicationโ€™s fault? ... Though most users have good intention โ€“ the 
server side application has the responsibility to check for the one in a million bad 
user/request 
๏‚ž The attacker abuses an existing session in the victims browser, he/she "rides" on it. This is 
known as Session Riding .. a.k.a CSRF.
The application allows a user to submit a state changing request that does not 
include anything secret. For example: 
http://example.com/app/transferFunds?amount=1500&destinationAccount=4673 
243243 
So, the attacker constructs a request that will transfer money from the victimโ€™s 
account to the attackerโ€™s account, and then embeds this attack in an image 
request or iframe stored on various sites under the attackerโ€™s control: 
<img 
src="http://example.com/app/transferFunds?amount=1500&destinationAccount= 
attackersAcct#" width="0" height="0" /> 
If the victim visits any of the attackerโ€™s sites while already authenticated to 
example.com, these forged requests will automatically include the userโ€™s session 
info, authorizing the attackerโ€™s request.
๏‚ž Logoff immediately after using a critical web application 
๏‚ž Do not save username/passwords (browser capability), auto complete 
๏‚ž Donโ€™t Use โ€œremember meโ€ your login (uses persistent cookies) 
๏‚ž Do not use the same browser to access sensitive applications and to surf 
freely the Internet. However, if both things have to be done at the same 
machine, do them with separate browsers (IE and FF, or IE and Chrome, 
or FF- Chrome). 
๏‚ž Using HTML enabled mail pose additional risks since simply viewing a 
mail message might lead to the execution of an attack. 
๏‚ž Check computer for malwares frequently
๏‚ž Insert custom random tokens into every form and URL - (Synchronizer 
Token Design Pattern) 
๏‚ž Make sure there a no XSS/HTML Tag Injection, Link Injection, Phishing 
vulnerabilities in user application 
๏‚ž Re-authenticate when performing high risk transactions 
๏‚ž Do not use GET requests for sensitive data or to perform high risk 
transactions. 
๏‚ž Do not allow POST variables as GET when submitting forms 
๏‚ž When using Flash always have restricted crossdomain.xml file (on the 
server) 
๏‚ž When redirecting out of domain requestsโ€“ implement a white list 
approach. 
๏‚ž Disable all Unsafe HTTP methods (all except GET and POST)
๏‚ž Only accept POST 
โ€บ Stops simple link-based attacks (IMG, frames, etc.) 
โ€บ But hidden POST requests can be created with 
iframes, scripts, etcโ€ฆ 
๏‚ž Referrer checking 
โ€บ Some users prohibit referrers, so user canโ€™t just require 
referrer headers 
โ€บ Techniques to selectively create HTTP request without 
referrers exist 
๏‚ž Requiring multi-step transactions 
โ€บ CSRF attack can perform each step in order 
๏‚ž URL Rewriting
๏‚ž CSRF is a special case of Cross Site 
Scripting (XSS) 
๏‚ž POSTs are not vulnerable to CSRF 
๏‚ž CSRF is low risk vulnerability 
๏‚ž Different vulnerability, root causes and 
countermeasures. XSS can facilitate CSRF 
๏‚ž It is more difficult to exploit but they can 
lead to automatic submission 
๏‚ž Can perform any un-authorized business 
transaction such as change passwords, 
force logouts, transfer money, disclose 
information.
๏‚ž Preventing CSRF usually requires the inclusion of an unpredictable token in 
each HTTP request. Such tokens should, at a minimum, be unique per user 
session. The preferred option is to include the unique token in a hidden 
field. This causes the value to be sent in the body of the HTTP request, 
avoiding its inclusion in the URL, which is more prone to exposure. 
๏‚ž The unique token can also be included in the URL itself, or a URL 
parameter. However, such placement runs a greater risk that the URL will 
be exposed to an attacker, thus compromising the secret token. 
OWASPโ€™s CSRF Guard can automatically include such tokens in Java EE, 
.NET, or PHP apps. OWASPโ€™s ESAPI includes methods developers can use to 
prevent CSRF vulnerabilities. 
๏‚ž Requiring the user to re-authenticate, or prove they are a user (e.g., via a 
CAPTCHA) can also protect against CSRF.
โ€ข Auger, R. (2010). Cross Site Request Forgery. Retrieved on Oct. 14, 2014 from 
http://projects.webappsec.org/w/page/13246919/Cross%20Site%20Request%20Forgery 
โ€ข Acunetix. CSRF Attacks โ€“ What They Are and How to Defend Against Them. Retrieved on Oct. 
14, 2014 from http://www.acunetix.com/websitesecurity/csrf-attacks/ 
โ€ข CWE-352. Cross-Site Request Forgery (CSRF). Retrieved on Sept. 14, 2014 from 
http://cwe.mitre.org/data/definitions/352.html 
โ€ข OWASP. Top 10 2013-A8-Cross-Site Request Forgery (CSRF). Retrieved on Sept. 12, 2014 from 
https://www.owasp.org/index.php/Top_10_2013-A8-Cross-Site_Request_Forgery_(CSRF) 
โ€ข Padinjaruveetil, G. Cross-Site Request Forgery Vulnerability. Retrieved on Oct. 21, 2014 from 
http://www.slideshare.net/capgemini/crosssite-request-forgery-vulnerability-a-sleeping-giant? 
qid=c81be391-715a-4f23-beb6-673e5567e0b0&v=qf1&b=&from_search=1
โ€ข CSRF Vulnerability: A 'Sleeping Giant - โ€˜http://www.darkreading.com/risk/csrf-vulnerability-a-sleeping-giant/d/d-id/ 
1128371 
โ€ข Cookies are bad for you: Improving web application security - http://sitr.us/2011/08/26/cookies-are-bad-for-you.html 
โ€ข Interface HTTPUtilities - http://owasp-esapi-java. 
googlecode.com/svn/trunk_doc/latest/org/owasp/esapi/HTTPUtilities.html 
โ€ข http://www.darkreading.com/default.asp 
โ€ข Login Cross-Site Request Forgery (CSRF) - http://www.ethicalhack3r.co.uk/login-cross-site-request-forgery-csrf/ 
โ€ข OWASP. Category: OWASP CSRF Guard Project - https://www.owasp.org/index.php/CSRFGuard 
โ€ข OWASP. CSRF Guard 3 Token Injection https://www.owasp.org/index.php/CSRFGuard_3_Token_Injection 
โ€ข OWASP. Category: OWASP CSRF Tester Project https://www.owasp.org/index.php/CSRFTester 
โ€ข OWASP. Category: OWASP Enterprise Security API https://www.owasp.org/index.php/ESAPI 
โ€ข Stack Overflow. CSRF (Cross-site request forgery) attack example and prevention in PHP 
โ€ข Using CSRF Protection in the Login Form - http://symfony.com/doc/current/cookbook/security/csrf_in_login_form.html 
โ€ข Veracode. Cross-Site Request Forgery Guide: Learn All About CSRF Attacks and CSRF Protection 
http://www.veracode.com/security/csrf 
โ€ข Wasson, M. (2012). Preventing Cross-Site Request Forgery (CSRF) Attacks in ASP.NET Web API http://www.asp.net/web-api/ 
overview/security/preventing-cross-site-request-forgery-(csrf)-attacks
๏ƒ˜ According to Ray Kurzweil, by the year 2045, โ€œhuman 
intelligence will enhance a billion-fold thanks to high-tech brain 
extensions. He refers to this phenomenon as the โ€œsingularity,โ€ a 
point at which humans and computers will merge. This sort of 
โ€œone in twoโ€ will create serious challenges for security and in the 
allocation of moral accountability between the twoโ€ฆ Singularity 
- http://www.youtube.com/watch?v=-wqaEsEApSE 
๏ƒ˜ How does the Future look like.. - 
http://www.youtube.com/watch?v=H4axEZwLdno

More Related Content

What's hot

Cross Site Scripting
Cross Site ScriptingCross Site Scripting
Cross Site Scripting
Ali Mattash
ย 
Cross Site Request Forgery (CSRF) Scripting Explained
Cross Site Request Forgery (CSRF) Scripting ExplainedCross Site Request Forgery (CSRF) Scripting Explained
Cross Site Request Forgery (CSRF) Scripting Explained
Valency Networks
ย 
Web application security & Testing
Web application security  & TestingWeb application security  & Testing
Web application security & Testing
Deepu S Nath
ย 

What's hot (20)

Directory Traversal & File Inclusion Attacks
Directory Traversal & File Inclusion AttacksDirectory Traversal & File Inclusion Attacks
Directory Traversal & File Inclusion Attacks
ย 
Cross Site Scripting
Cross Site ScriptingCross Site Scripting
Cross Site Scripting
ย 
Cross Site Request Forgery (CSRF) Scripting Explained
Cross Site Request Forgery (CSRF) Scripting ExplainedCross Site Request Forgery (CSRF) Scripting Explained
Cross Site Request Forgery (CSRF) Scripting Explained
ย 
Cross Site Scripting ( XSS)
Cross Site Scripting ( XSS)Cross Site Scripting ( XSS)
Cross Site Scripting ( XSS)
ย 
Deep understanding on Cross-Site Scripting and SQL Injection
Deep understanding on Cross-Site Scripting and SQL InjectionDeep understanding on Cross-Site Scripting and SQL Injection
Deep understanding on Cross-Site Scripting and SQL Injection
ย 
Secure Session Management
Secure Session ManagementSecure Session Management
Secure Session Management
ย 
Xss ppt
Xss pptXss ppt
Xss ppt
ย 
Sql injections - with example
Sql injections - with exampleSql injections - with example
Sql injections - with example
ย 
Cross Site Scripting Defense Presentation
Cross Site Scripting Defense Presentation Cross Site Scripting Defense Presentation
Cross Site Scripting Defense Presentation
ย 
Ssrf
SsrfSsrf
Ssrf
ย 
Cross site scripting
Cross site scriptingCross site scripting
Cross site scripting
ย 
Bug bounty null_owasp_2k17
Bug bounty null_owasp_2k17Bug bounty null_owasp_2k17
Bug bounty null_owasp_2k17
ย 
Web application security & Testing
Web application security  & TestingWeb application security  & Testing
Web application security & Testing
ย 
SSRF exploit the trust relationship
SSRF exploit the trust relationshipSSRF exploit the trust relationship
SSRF exploit the trust relationship
ย 
Xss (cross site scripting)
Xss (cross site scripting)Xss (cross site scripting)
Xss (cross site scripting)
ย 
XSS Magic tricks
XSS Magic tricksXSS Magic tricks
XSS Magic tricks
ย 
Cross site scripting attacks and defenses
Cross site scripting attacks and defensesCross site scripting attacks and defenses
Cross site scripting attacks and defenses
ย 
Deep dive into ssrf
Deep dive into ssrfDeep dive into ssrf
Deep dive into ssrf
ย 
Owasp top 10 vulnerabilities
Owasp top 10 vulnerabilitiesOwasp top 10 vulnerabilities
Owasp top 10 vulnerabilities
ย 
How to identify and prevent SQL injection
How to identify and prevent SQL injection  How to identify and prevent SQL injection
How to identify and prevent SQL injection
ย 

Viewers also liked

RIPS - static code analyzer for vulnerabilities in PHP
RIPS - static code analyzer for vulnerabilities in PHPRIPS - static code analyzer for vulnerabilities in PHP
RIPS - static code analyzer for vulnerabilities in PHP
Sorina Chirilฤƒ
ย 
Sql injection attacks
Sql injection attacksSql injection attacks
Sql injection attacks
Nitish Kumar
ย 
Sql injection attack_analysis_py_vo
Sql injection attack_analysis_py_voSql injection attack_analysis_py_vo
Sql injection attack_analysis_py_vo
Jirka Vejrazka
ย 
Simplified Security Code Review Process
Simplified Security Code Review ProcessSimplified Security Code Review Process
Simplified Security Code Review Process
Sherif Koussa
ย 
Sql Injection Attacks And Defense Presentatio (1)
Sql Injection Attacks And Defense Presentatio (1)Sql Injection Attacks And Defense Presentatio (1)
Sql Injection Attacks And Defense Presentatio (1)
guest32e5cfe
ย 
Sql injection
Sql injectionSql injection
Sql injection
Nitish Kumar
ย 

Viewers also liked (17)

Testing the OWASP Top 10
Testing the OWASP Top 10Testing the OWASP Top 10
Testing the OWASP Top 10
ย 
[Php Camp]Owasp Php Top5+Csrf
[Php Camp]Owasp Php Top5+Csrf[Php Camp]Owasp Php Top5+Csrf
[Php Camp]Owasp Php Top5+Csrf
ย 
Best Practices of Static Code Analysis in the SDLC
Best Practices of Static Code Analysis in the SDLCBest Practices of Static Code Analysis in the SDLC
Best Practices of Static Code Analysis in the SDLC
ย 
Static Analysis and Code Optimizations in Glasgow Haskell Compiler
Static Analysis and Code Optimizations in Glasgow Haskell CompilerStatic Analysis and Code Optimizations in Glasgow Haskell Compiler
Static Analysis and Code Optimizations in Glasgow Haskell Compiler
ย 
Poster Analysis Source Code
Poster Analysis Source CodePoster Analysis Source Code
Poster Analysis Source Code
ย 
Source Code Analysis with SAST
Source Code Analysis with SASTSource Code Analysis with SAST
Source Code Analysis with SAST
ย 
RIPS - static code analyzer for vulnerabilities in PHP
RIPS - static code analyzer for vulnerabilities in PHPRIPS - static code analyzer for vulnerabilities in PHP
RIPS - static code analyzer for vulnerabilities in PHP
ย 
Sql injection attacks
Sql injection attacksSql injection attacks
Sql injection attacks
ย 
Sql injection attack_analysis_py_vo
Sql injection attack_analysis_py_voSql injection attack_analysis_py_vo
Sql injection attack_analysis_py_vo
ย 
Protecting your data from SQL Injection attacks
Protecting your data from SQL Injection attacksProtecting your data from SQL Injection attacks
Protecting your data from SQL Injection attacks
ย 
Hp fortify source code analyzer(sca)
Hp fortify source code analyzer(sca)Hp fortify source code analyzer(sca)
Hp fortify source code analyzer(sca)
ย 
A2 - broken authentication and session management(OWASP thailand chapter Apri...
A2 - broken authentication and session management(OWASP thailand chapter Apri...A2 - broken authentication and session management(OWASP thailand chapter Apri...
A2 - broken authentication and session management(OWASP thailand chapter Apri...
ย 
Static Code Analysis
Static Code AnalysisStatic Code Analysis
Static Code Analysis
ย 
2013 OWASP Top 10
2013 OWASP Top 102013 OWASP Top 10
2013 OWASP Top 10
ย 
Simplified Security Code Review Process
Simplified Security Code Review ProcessSimplified Security Code Review Process
Simplified Security Code Review Process
ย 
Sql Injection Attacks And Defense Presentatio (1)
Sql Injection Attacks And Defense Presentatio (1)Sql Injection Attacks And Defense Presentatio (1)
Sql Injection Attacks And Defense Presentatio (1)
ย 
Sql injection
Sql injectionSql injection
Sql injection
ย 

Similar to A8 cross site request forgery (csrf) it 6873 presentation

A4 A K S H A Y B H A R D W A J
A4    A K S H A Y  B H A R D W A JA4    A K S H A Y  B H A R D W A J
A4 A K S H A Y B H A R D W A J
bhardwajakshay
ย 
OWASP Serbia - A5 cross-site request forgery
OWASP Serbia - A5 cross-site request forgeryOWASP Serbia - A5 cross-site request forgery
OWASP Serbia - A5 cross-site request forgery
Nikola Milosevic
ย 
CSRF Attacks and its Defence using Middleware
CSRF Attacks and its Defence using MiddlewareCSRF Attacks and its Defence using Middleware
CSRF Attacks and its Defence using Middleware
ijtsrd
ย 

Similar to A8 cross site request forgery (csrf) it 6873 presentation (20)

Cyber security 2.pptx
Cyber security 2.pptxCyber security 2.pptx
Cyber security 2.pptx
ย 
A4 A K S H A Y B H A R D W A J
A4    A K S H A Y  B H A R D W A JA4    A K S H A Y  B H A R D W A J
A4 A K S H A Y B H A R D W A J
ย 
Session7-XSS & CSRF
Session7-XSS & CSRFSession7-XSS & CSRF
Session7-XSS & CSRF
ย 
Cross-Site Request Forgery Vulnerability: โ€œA Sleeping Giantโ€
Cross-Site Request Forgery Vulnerability: โ€œA Sleeping Giantโ€Cross-Site Request Forgery Vulnerability: โ€œA Sleeping Giantโ€
Cross-Site Request Forgery Vulnerability: โ€œA Sleeping Giantโ€
ย 
Prevention Against CSRF Attack using Client Server Mutual Authentication Tech...
Prevention Against CSRF Attack using Client Server Mutual Authentication Tech...Prevention Against CSRF Attack using Client Server Mutual Authentication Tech...
Prevention Against CSRF Attack using Client Server Mutual Authentication Tech...
ย 
Hack using firefox
Hack using firefoxHack using firefox
Hack using firefox
ย 
Its all about CSRF - null Mumbai Meet 10 January 2015 Null/OWASP Chapter
Its all about CSRF - null Mumbai Meet 10 January 2015 Null/OWASP Chapter Its all about CSRF - null Mumbai Meet 10 January 2015 Null/OWASP Chapter
Its all about CSRF - null Mumbai Meet 10 January 2015 Null/OWASP Chapter
ย 
Intro to Web Application Security
Intro to Web Application SecurityIntro to Web Application Security
Intro to Web Application Security
ย 
OWASP Serbia - A5 cross-site request forgery
OWASP Serbia - A5 cross-site request forgeryOWASP Serbia - A5 cross-site request forgery
OWASP Serbia - A5 cross-site request forgery
ย 
MVC CSRF Protection
MVC CSRF ProtectionMVC CSRF Protection
MVC CSRF Protection
ย 
XSS, LFI & CSRF vulnerabilities
XSS, LFI & CSRF vulnerabilitiesXSS, LFI & CSRF vulnerabilities
XSS, LFI & CSRF vulnerabilities
ย 
Cross Site Request Forgery- CSRF
Cross Site Request Forgery- CSRF Cross Site Request Forgery- CSRF
Cross Site Request Forgery- CSRF
ย 
Owasp Top 10 - Owasp Pune Chapter - January 2008
Owasp Top 10 - Owasp Pune Chapter - January 2008Owasp Top 10 - Owasp Pune Chapter - January 2008
Owasp Top 10 - Owasp Pune Chapter - January 2008
ย 
CSRF Attacks and its Defence using Middleware
CSRF Attacks and its Defence using MiddlewareCSRF Attacks and its Defence using Middleware
CSRF Attacks and its Defence using Middleware
ย 
Security 101
Security 101Security 101
Security 101
ย 
Cyber Security-Ethical Hacking
Cyber Security-Ethical HackingCyber Security-Ethical Hacking
Cyber Security-Ethical Hacking
ย 
PENETRATION TEST ( CLIENT-SIDE ) CSRF / CORS MISCONFIGURATION
PENETRATION TEST ( CLIENT-SIDE ) CSRF / CORS MISCONFIGURATIONPENETRATION TEST ( CLIENT-SIDE ) CSRF / CORS MISCONFIGURATION
PENETRATION TEST ( CLIENT-SIDE ) CSRF / CORS MISCONFIGURATION
ย 
Grey H@t - Cross-site Request Forgery
Grey H@t - Cross-site Request ForgeryGrey H@t - Cross-site Request Forgery
Grey H@t - Cross-site Request Forgery
ย 
Web Application Security
Web Application SecurityWeb Application Security
Web Application Security
ย 
Web Application Security Tips
Web Application Security TipsWeb Application Security Tips
Web Application Security Tips
ย 

Recently uploaded

Russian Call Girls Pune (Adult Only) 8005736733 Escort Service 24x7 Cash Pay...
Russian Call Girls Pune  (Adult Only) 8005736733 Escort Service 24x7 Cash Pay...Russian Call Girls Pune  (Adult Only) 8005736733 Escort Service 24x7 Cash Pay...
Russian Call Girls Pune (Adult Only) 8005736733 Escort Service 24x7 Cash Pay...
SUHANI PANDEY
ย 
Call Girls In Model Towh Delhi ๐Ÿ’ฏCall Us ๐Ÿ”8264348440๐Ÿ”
Call Girls In Model Towh Delhi ๐Ÿ’ฏCall Us ๐Ÿ”8264348440๐Ÿ”Call Girls In Model Towh Delhi ๐Ÿ’ฏCall Us ๐Ÿ”8264348440๐Ÿ”
Call Girls In Model Towh Delhi ๐Ÿ’ฏCall Us ๐Ÿ”8264348440๐Ÿ”
soniya singh
ย 
Ganeshkhind ! Call Girls Pune - 450+ Call Girl Cash Payment 8005736733 Neha T...
Ganeshkhind ! Call Girls Pune - 450+ Call Girl Cash Payment 8005736733 Neha T...Ganeshkhind ! Call Girls Pune - 450+ Call Girl Cash Payment 8005736733 Neha T...
Ganeshkhind ! Call Girls Pune - 450+ Call Girl Cash Payment 8005736733 Neha T...
SUHANI PANDEY
ย 
Call Girls in Prashant Vihar, Delhi ๐Ÿ’ฏ Call Us ๐Ÿ”9953056974 ๐Ÿ” Escort Service
Call Girls in Prashant Vihar, Delhi ๐Ÿ’ฏ Call Us ๐Ÿ”9953056974 ๐Ÿ” Escort ServiceCall Girls in Prashant Vihar, Delhi ๐Ÿ’ฏ Call Us ๐Ÿ”9953056974 ๐Ÿ” Escort Service
Call Girls in Prashant Vihar, Delhi ๐Ÿ’ฏ Call Us ๐Ÿ”9953056974 ๐Ÿ” Escort Service
9953056974 Low Rate Call Girls In Saket, Delhi NCR
ย 
VIP Model Call Girls NIBM ( Pune ) Call ON 8005736733 Starting From 5K to 25K...
VIP Model Call Girls NIBM ( Pune ) Call ON 8005736733 Starting From 5K to 25K...VIP Model Call Girls NIBM ( Pune ) Call ON 8005736733 Starting From 5K to 25K...
VIP Model Call Girls NIBM ( Pune ) Call ON 8005736733 Starting From 5K to 25K...
SUHANI PANDEY
ย 
Shikrapur - Call Girls in Pune Neha 8005736733 | 100% Gennuine High Class Ind...
Shikrapur - Call Girls in Pune Neha 8005736733 | 100% Gennuine High Class Ind...Shikrapur - Call Girls in Pune Neha 8005736733 | 100% Gennuine High Class Ind...
Shikrapur - Call Girls in Pune Neha 8005736733 | 100% Gennuine High Class Ind...
SUHANI PANDEY
ย 
VIP Model Call Girls Hadapsar ( Pune ) Call ON 9905417584 Starting High Prof...
VIP Model Call Girls Hadapsar ( Pune ) Call ON 9905417584 Starting  High Prof...VIP Model Call Girls Hadapsar ( Pune ) Call ON 9905417584 Starting  High Prof...
VIP Model Call Girls Hadapsar ( Pune ) Call ON 9905417584 Starting High Prof...
singhpriety023
ย 
valsad Escorts Service โ˜Ž๏ธ 6378878445 ( Sakshi Sinha ) High Profile Call Girls...
valsad Escorts Service โ˜Ž๏ธ 6378878445 ( Sakshi Sinha ) High Profile Call Girls...valsad Escorts Service โ˜Ž๏ธ 6378878445 ( Sakshi Sinha ) High Profile Call Girls...
valsad Escorts Service โ˜Ž๏ธ 6378878445 ( Sakshi Sinha ) High Profile Call Girls...
Call Girls In Delhi Whatsup 9873940964 Enjoy Unlimited Pleasure
ย 
Low Sexy Call Girls In Mohali 9053900678 ๐ŸฅตHave Save And Good Place ๐Ÿฅต
Low Sexy Call Girls In Mohali 9053900678 ๐ŸฅตHave Save And Good Place ๐ŸฅตLow Sexy Call Girls In Mohali 9053900678 ๐ŸฅตHave Save And Good Place ๐Ÿฅต
Low Sexy Call Girls In Mohali 9053900678 ๐ŸฅตHave Save And Good Place ๐Ÿฅต
Chandigarh Call girls 9053900678 Call girls in Chandigarh
ย 
AWS Community DAY Albertini-Ellan Cloud Security (1).pptx
AWS Community DAY Albertini-Ellan Cloud Security (1).pptxAWS Community DAY Albertini-Ellan Cloud Security (1).pptx
AWS Community DAY Albertini-Ellan Cloud Security (1).pptx
ellan12
ย 
Call Girls In Pratap Nagar Delhi ๐Ÿ’ฏCall Us ๐Ÿ”8264348440๐Ÿ”
Call Girls In Pratap Nagar Delhi ๐Ÿ’ฏCall Us ๐Ÿ”8264348440๐Ÿ”Call Girls In Pratap Nagar Delhi ๐Ÿ’ฏCall Us ๐Ÿ”8264348440๐Ÿ”
Call Girls In Pratap Nagar Delhi ๐Ÿ’ฏCall Us ๐Ÿ”8264348440๐Ÿ”
soniya singh
ย 

Recently uploaded (20)

Al Barsha Night Partner +0567686026 Call Girls Dubai
Al Barsha Night Partner +0567686026 Call Girls  DubaiAl Barsha Night Partner +0567686026 Call Girls  Dubai
Al Barsha Night Partner +0567686026 Call Girls Dubai
ย 
Russian Call Girls Pune (Adult Only) 8005736733 Escort Service 24x7 Cash Pay...
Russian Call Girls Pune  (Adult Only) 8005736733 Escort Service 24x7 Cash Pay...Russian Call Girls Pune  (Adult Only) 8005736733 Escort Service 24x7 Cash Pay...
Russian Call Girls Pune (Adult Only) 8005736733 Escort Service 24x7 Cash Pay...
ย 
Call Girls In Model Towh Delhi ๐Ÿ’ฏCall Us ๐Ÿ”8264348440๐Ÿ”
Call Girls In Model Towh Delhi ๐Ÿ’ฏCall Us ๐Ÿ”8264348440๐Ÿ”Call Girls In Model Towh Delhi ๐Ÿ’ฏCall Us ๐Ÿ”8264348440๐Ÿ”
Call Girls In Model Towh Delhi ๐Ÿ’ฏCall Us ๐Ÿ”8264348440๐Ÿ”
ย 
Ganeshkhind ! Call Girls Pune - 450+ Call Girl Cash Payment 8005736733 Neha T...
Ganeshkhind ! Call Girls Pune - 450+ Call Girl Cash Payment 8005736733 Neha T...Ganeshkhind ! Call Girls Pune - 450+ Call Girl Cash Payment 8005736733 Neha T...
Ganeshkhind ! Call Girls Pune - 450+ Call Girl Cash Payment 8005736733 Neha T...
ย 
Moving Beyond Twitter/X and Facebook - Social Media for local news providers
Moving Beyond Twitter/X and Facebook - Social Media for local news providersMoving Beyond Twitter/X and Facebook - Social Media for local news providers
Moving Beyond Twitter/X and Facebook - Social Media for local news providers
ย 
Call Now โ˜Ž 8264348440 !! Call Girls in Sarai Rohilla Escort Service Delhi N.C.R.
Call Now โ˜Ž 8264348440 !! Call Girls in Sarai Rohilla Escort Service Delhi N.C.R.Call Now โ˜Ž 8264348440 !! Call Girls in Sarai Rohilla Escort Service Delhi N.C.R.
Call Now โ˜Ž 8264348440 !! Call Girls in Sarai Rohilla Escort Service Delhi N.C.R.
ย 
Call Girls in Prashant Vihar, Delhi ๐Ÿ’ฏ Call Us ๐Ÿ”9953056974 ๐Ÿ” Escort Service
Call Girls in Prashant Vihar, Delhi ๐Ÿ’ฏ Call Us ๐Ÿ”9953056974 ๐Ÿ” Escort ServiceCall Girls in Prashant Vihar, Delhi ๐Ÿ’ฏ Call Us ๐Ÿ”9953056974 ๐Ÿ” Escort Service
Call Girls in Prashant Vihar, Delhi ๐Ÿ’ฏ Call Us ๐Ÿ”9953056974 ๐Ÿ” Escort Service
ย 
๐“€คCall On 7877925207 ๐“€ค Ahmedguda Call Girls Hot Model With Sexy Bhabi Ready Fo...
๐“€คCall On 7877925207 ๐“€ค Ahmedguda Call Girls Hot Model With Sexy Bhabi Ready Fo...๐“€คCall On 7877925207 ๐“€ค Ahmedguda Call Girls Hot Model With Sexy Bhabi Ready Fo...
๐“€คCall On 7877925207 ๐“€ค Ahmedguda Call Girls Hot Model With Sexy Bhabi Ready Fo...
ย 
VIP Model Call Girls NIBM ( Pune ) Call ON 8005736733 Starting From 5K to 25K...
VIP Model Call Girls NIBM ( Pune ) Call ON 8005736733 Starting From 5K to 25K...VIP Model Call Girls NIBM ( Pune ) Call ON 8005736733 Starting From 5K to 25K...
VIP Model Call Girls NIBM ( Pune ) Call ON 8005736733 Starting From 5K to 25K...
ย 
Enjoy NightโšกCall Girls Dlf City Phase 3 Gurgaon >เผ’8448380779 Escort Service
Enjoy NightโšกCall Girls Dlf City Phase 3 Gurgaon >เผ’8448380779 Escort ServiceEnjoy NightโšกCall Girls Dlf City Phase 3 Gurgaon >เผ’8448380779 Escort Service
Enjoy NightโšกCall Girls Dlf City Phase 3 Gurgaon >เผ’8448380779 Escort Service
ย 
Russian Call girl in Ajman +971563133746 Ajman Call girl Service
Russian Call girl in Ajman +971563133746 Ajman Call girl ServiceRussian Call girl in Ajman +971563133746 Ajman Call girl Service
Russian Call girl in Ajman +971563133746 Ajman Call girl Service
ย 
VVVIP Call Girls In Connaught Place โžก๏ธ Delhi โžก๏ธ 9999965857 ๐Ÿš€ No Advance 24HRS...
VVVIP Call Girls In Connaught Place โžก๏ธ Delhi โžก๏ธ 9999965857 ๐Ÿš€ No Advance 24HRS...VVVIP Call Girls In Connaught Place โžก๏ธ Delhi โžก๏ธ 9999965857 ๐Ÿš€ No Advance 24HRS...
VVVIP Call Girls In Connaught Place โžก๏ธ Delhi โžก๏ธ 9999965857 ๐Ÿš€ No Advance 24HRS...
ย 
Shikrapur - Call Girls in Pune Neha 8005736733 | 100% Gennuine High Class Ind...
Shikrapur - Call Girls in Pune Neha 8005736733 | 100% Gennuine High Class Ind...Shikrapur - Call Girls in Pune Neha 8005736733 | 100% Gennuine High Class Ind...
Shikrapur - Call Girls in Pune Neha 8005736733 | 100% Gennuine High Class Ind...
ย 
VIP Model Call Girls Hadapsar ( Pune ) Call ON 9905417584 Starting High Prof...
VIP Model Call Girls Hadapsar ( Pune ) Call ON 9905417584 Starting  High Prof...VIP Model Call Girls Hadapsar ( Pune ) Call ON 9905417584 Starting  High Prof...
VIP Model Call Girls Hadapsar ( Pune ) Call ON 9905417584 Starting High Prof...
ย 
valsad Escorts Service โ˜Ž๏ธ 6378878445 ( Sakshi Sinha ) High Profile Call Girls...
valsad Escorts Service โ˜Ž๏ธ 6378878445 ( Sakshi Sinha ) High Profile Call Girls...valsad Escorts Service โ˜Ž๏ธ 6378878445 ( Sakshi Sinha ) High Profile Call Girls...
valsad Escorts Service โ˜Ž๏ธ 6378878445 ( Sakshi Sinha ) High Profile Call Girls...
ย 
Trump Diapers Over Dems t shirts Sweatshirt
Trump Diapers Over Dems t shirts SweatshirtTrump Diapers Over Dems t shirts Sweatshirt
Trump Diapers Over Dems t shirts Sweatshirt
ย 
Low Sexy Call Girls In Mohali 9053900678 ๐ŸฅตHave Save And Good Place ๐Ÿฅต
Low Sexy Call Girls In Mohali 9053900678 ๐ŸฅตHave Save And Good Place ๐ŸฅตLow Sexy Call Girls In Mohali 9053900678 ๐ŸฅตHave Save And Good Place ๐Ÿฅต
Low Sexy Call Girls In Mohali 9053900678 ๐ŸฅตHave Save And Good Place ๐Ÿฅต
ย 
AWS Community DAY Albertini-Ellan Cloud Security (1).pptx
AWS Community DAY Albertini-Ellan Cloud Security (1).pptxAWS Community DAY Albertini-Ellan Cloud Security (1).pptx
AWS Community DAY Albertini-Ellan Cloud Security (1).pptx
ย 
Call Girls In Pratap Nagar Delhi ๐Ÿ’ฏCall Us ๐Ÿ”8264348440๐Ÿ”
Call Girls In Pratap Nagar Delhi ๐Ÿ’ฏCall Us ๐Ÿ”8264348440๐Ÿ”Call Girls In Pratap Nagar Delhi ๐Ÿ’ฏCall Us ๐Ÿ”8264348440๐Ÿ”
Call Girls In Pratap Nagar Delhi ๐Ÿ’ฏCall Us ๐Ÿ”8264348440๐Ÿ”
ย 
WhatsApp ๐Ÿ“ž 8448380779 โœ…Call Girls In Mamura Sector 66 ( Noida)
WhatsApp ๐Ÿ“ž 8448380779 โœ…Call Girls In Mamura Sector 66 ( Noida)WhatsApp ๐Ÿ“ž 8448380779 โœ…Call Girls In Mamura Sector 66 ( Noida)
WhatsApp ๐Ÿ“ž 8448380779 โœ…Call Girls In Mamura Sector 66 ( Noida)
ย 

A8 cross site request forgery (csrf) it 6873 presentation

  • 1.
  • 2. ๏‚ž What is Cross Site Request Forgery ๏‚ž Cross Site Request Forgery Vulnerability ๏‚ž Which Websites are Vulnerable ๏‚ž How the CSRF works โ€“ โ€œRiding the Sessionโ€ ๏‚ž Example Attack Scenario ๏‚ž CSRF Mitigation Best Practices: โ€บ For the End User โ€บ For Applications ๏‚ž Misconceptions about CSRF โ€“ Defenses That Donโ€™t Work ๏‚ž CSRF Myths and Reality ๏‚ž How to Prevent CSRF
  • 3. A Cross Site Request Forgery (CSRF) โ€“ the โ€œsleeping giantโ€, is an attack that forces a logged-on victimโ€™s browser to send a forged HTTP request, including the victimโ€™s session cookie and any other automatically included authentication information, to a vulnerable web application. This allows the attacker to force the victimโ€™s browser to generate requests the vulnerable application thinks are legitimate requests from the victim.
  • 4. Cross-site request forgery, is also known as a one-click attack or session riding and abbreviated as CSRF ("sea-surf") or XSRF, is a type of malicious exploit of a website whereby unauthorized commands are transmitted from a user that the website trusts. ...โ€
  • 5. The seed for CSRF vulnerability goes back 25 years agoโ€ฆto the birth of Internet and world wide web. The Bad people have all the time in the world, and they need to be successful only once, but the enforcement teams have to be successful 100% of the time.
  • 6. Cross-site request forgery vulnerabilities exploit the trust that a Web Application has on the Client Browser: ๏‚ž Exploits a users privileges and trust to a particular Website. ๏‚ž Exploits the trust that applications have on authenticated sessions. ๏‚ž It is a Client Side(Browser) attack. Identifying the attacker is even more difficult as the attack occurs in the context of the authenticated user!
  • 7. ๏‚ž The key characteristic of a CSRF vulnerability are that the application accepts a request that makes something occur on the server and the attacker can determine all the parameters of that request for another user. ๏‚ž Not to be confused with Cross Site Scripting! In Cross Site Scripting (XSS), the attacker exploits the trust a user has for a website, with CSRF on the other hand, the attacker exploits the trust a website has against a userโ€™s browser. ๏‚ž CSRF Involves two key components to be successful: โ€บ A willing victim (this cannot be controlled) โ€บ A vulnerable website (this can be controlled)
  • 8. ๏‚ž Checking whether an application is vulnerable is by seeing if any links and forms lack an unpredictable CSRF token. Without such a token, attackers can forge malicious requests. ๏‚ž An alternate defense is to require the user to prove they intended to submit the request, either through re-authentication, or some other proof they are a real user (e.g., a CAPTCHA). ๏‚ž Also, important is focusing on the links and forms that invoke state-changing functions, since those are the most important CSRF targets. ๏‚ž The multistep transactions should be also checked, as they are not inherently immune. Attackers can easily forge a series of requests by using multiple tags or possibly JavaScript. ๏‚ž Session cookies, source IP addresses, and other information automatically sent by the browser donโ€™t provide any defense against CSRF since this information is also included in forged requests.
  • 9. ๏‚ž Websites that has not taken specific steps to mitigate the risks of CSRF attacks are most like vulnerable. ๏‚ž Every piece of sensitive website functionality is vulnerable ๏‚ž According to Open Web Application Security Project (OWASP): โ€œCross Site request forgery is not a new attack, but is simple and devastating.." This vulnerability is extremely widespread.." " all web application frameworks are vulnerable to CSRFโ€
  • 10. ๏‚ž HTTP is a Stateless Protocol, Web Applications maintains state through SessionID (in Cookies or URL Parameters, Hidden variables) ๏‚ž The Server Trusts the SessionID coming from the browser. ๏‚ž For authenticated sessions , the browser does not resend a NEW SessionID to the application as a proof that each HTTP request is authenticated ๏‚ž This allow for โ€œriding the sessionโ€ with an interleaved malicious HTTP request. ๏‚ž If an attacker phish a victim forcing him to select a web page (via web mail for example) that has a malicious HTML tag such as iframe with an embedded GET request and if such request is issued (by the victim web page selection) when an authenticated session with the same application is still valid, then such malicious request will processed by the application.
  • 11. ๏‚ž The Web application (server) implicitly assumes that any request that comes in expresses the will of the user, as it comes from the users browser. ๏‚ž The Application does not take into account that the request may as well have been foisted on the user by a third party. ๏‚ž Is this the web applicationโ€™s fault? ... Though most users have good intention โ€“ the server side application has the responsibility to check for the one in a million bad user/request ๏‚ž The attacker abuses an existing session in the victims browser, he/she "rides" on it. This is known as Session Riding .. a.k.a CSRF.
  • 12. The application allows a user to submit a state changing request that does not include anything secret. For example: http://example.com/app/transferFunds?amount=1500&destinationAccount=4673 243243 So, the attacker constructs a request that will transfer money from the victimโ€™s account to the attackerโ€™s account, and then embeds this attack in an image request or iframe stored on various sites under the attackerโ€™s control: <img src="http://example.com/app/transferFunds?amount=1500&destinationAccount= attackersAcct#" width="0" height="0" /> If the victim visits any of the attackerโ€™s sites while already authenticated to example.com, these forged requests will automatically include the userโ€™s session info, authorizing the attackerโ€™s request.
  • 13. ๏‚ž Logoff immediately after using a critical web application ๏‚ž Do not save username/passwords (browser capability), auto complete ๏‚ž Donโ€™t Use โ€œremember meโ€ your login (uses persistent cookies) ๏‚ž Do not use the same browser to access sensitive applications and to surf freely the Internet. However, if both things have to be done at the same machine, do them with separate browsers (IE and FF, or IE and Chrome, or FF- Chrome). ๏‚ž Using HTML enabled mail pose additional risks since simply viewing a mail message might lead to the execution of an attack. ๏‚ž Check computer for malwares frequently
  • 14. ๏‚ž Insert custom random tokens into every form and URL - (Synchronizer Token Design Pattern) ๏‚ž Make sure there a no XSS/HTML Tag Injection, Link Injection, Phishing vulnerabilities in user application ๏‚ž Re-authenticate when performing high risk transactions ๏‚ž Do not use GET requests for sensitive data or to perform high risk transactions. ๏‚ž Do not allow POST variables as GET when submitting forms ๏‚ž When using Flash always have restricted crossdomain.xml file (on the server) ๏‚ž When redirecting out of domain requestsโ€“ implement a white list approach. ๏‚ž Disable all Unsafe HTTP methods (all except GET and POST)
  • 15. ๏‚ž Only accept POST โ€บ Stops simple link-based attacks (IMG, frames, etc.) โ€บ But hidden POST requests can be created with iframes, scripts, etcโ€ฆ ๏‚ž Referrer checking โ€บ Some users prohibit referrers, so user canโ€™t just require referrer headers โ€บ Techniques to selectively create HTTP request without referrers exist ๏‚ž Requiring multi-step transactions โ€บ CSRF attack can perform each step in order ๏‚ž URL Rewriting
  • 16. ๏‚ž CSRF is a special case of Cross Site Scripting (XSS) ๏‚ž POSTs are not vulnerable to CSRF ๏‚ž CSRF is low risk vulnerability ๏‚ž Different vulnerability, root causes and countermeasures. XSS can facilitate CSRF ๏‚ž It is more difficult to exploit but they can lead to automatic submission ๏‚ž Can perform any un-authorized business transaction such as change passwords, force logouts, transfer money, disclose information.
  • 17. ๏‚ž Preventing CSRF usually requires the inclusion of an unpredictable token in each HTTP request. Such tokens should, at a minimum, be unique per user session. The preferred option is to include the unique token in a hidden field. This causes the value to be sent in the body of the HTTP request, avoiding its inclusion in the URL, which is more prone to exposure. ๏‚ž The unique token can also be included in the URL itself, or a URL parameter. However, such placement runs a greater risk that the URL will be exposed to an attacker, thus compromising the secret token. OWASPโ€™s CSRF Guard can automatically include such tokens in Java EE, .NET, or PHP apps. OWASPโ€™s ESAPI includes methods developers can use to prevent CSRF vulnerabilities. ๏‚ž Requiring the user to re-authenticate, or prove they are a user (e.g., via a CAPTCHA) can also protect against CSRF.
  • 18. โ€ข Auger, R. (2010). Cross Site Request Forgery. Retrieved on Oct. 14, 2014 from http://projects.webappsec.org/w/page/13246919/Cross%20Site%20Request%20Forgery โ€ข Acunetix. CSRF Attacks โ€“ What They Are and How to Defend Against Them. Retrieved on Oct. 14, 2014 from http://www.acunetix.com/websitesecurity/csrf-attacks/ โ€ข CWE-352. Cross-Site Request Forgery (CSRF). Retrieved on Sept. 14, 2014 from http://cwe.mitre.org/data/definitions/352.html โ€ข OWASP. Top 10 2013-A8-Cross-Site Request Forgery (CSRF). Retrieved on Sept. 12, 2014 from https://www.owasp.org/index.php/Top_10_2013-A8-Cross-Site_Request_Forgery_(CSRF) โ€ข Padinjaruveetil, G. Cross-Site Request Forgery Vulnerability. Retrieved on Oct. 21, 2014 from http://www.slideshare.net/capgemini/crosssite-request-forgery-vulnerability-a-sleeping-giant? qid=c81be391-715a-4f23-beb6-673e5567e0b0&v=qf1&b=&from_search=1
  • 19. โ€ข CSRF Vulnerability: A 'Sleeping Giant - โ€˜http://www.darkreading.com/risk/csrf-vulnerability-a-sleeping-giant/d/d-id/ 1128371 โ€ข Cookies are bad for you: Improving web application security - http://sitr.us/2011/08/26/cookies-are-bad-for-you.html โ€ข Interface HTTPUtilities - http://owasp-esapi-java. googlecode.com/svn/trunk_doc/latest/org/owasp/esapi/HTTPUtilities.html โ€ข http://www.darkreading.com/default.asp โ€ข Login Cross-Site Request Forgery (CSRF) - http://www.ethicalhack3r.co.uk/login-cross-site-request-forgery-csrf/ โ€ข OWASP. Category: OWASP CSRF Guard Project - https://www.owasp.org/index.php/CSRFGuard โ€ข OWASP. CSRF Guard 3 Token Injection https://www.owasp.org/index.php/CSRFGuard_3_Token_Injection โ€ข OWASP. Category: OWASP CSRF Tester Project https://www.owasp.org/index.php/CSRFTester โ€ข OWASP. Category: OWASP Enterprise Security API https://www.owasp.org/index.php/ESAPI โ€ข Stack Overflow. CSRF (Cross-site request forgery) attack example and prevention in PHP โ€ข Using CSRF Protection in the Login Form - http://symfony.com/doc/current/cookbook/security/csrf_in_login_form.html โ€ข Veracode. Cross-Site Request Forgery Guide: Learn All About CSRF Attacks and CSRF Protection http://www.veracode.com/security/csrf โ€ข Wasson, M. (2012). Preventing Cross-Site Request Forgery (CSRF) Attacks in ASP.NET Web API http://www.asp.net/web-api/ overview/security/preventing-cross-site-request-forgery-(csrf)-attacks
  • 20. ๏ƒ˜ According to Ray Kurzweil, by the year 2045, โ€œhuman intelligence will enhance a billion-fold thanks to high-tech brain extensions. He refers to this phenomenon as the โ€œsingularity,โ€ a point at which humans and computers will merge. This sort of โ€œone in twoโ€ will create serious challenges for security and in the allocation of moral accountability between the twoโ€ฆ Singularity - http://www.youtube.com/watch?v=-wqaEsEApSE ๏ƒ˜ How does the Future look like.. - http://www.youtube.com/watch?v=H4axEZwLdno