14.7 Lab: CSRF where token is not tied to user session

  Рет қаралды 31

Cyberw1ng

Cyberw1ng

Ай бұрын

A Simple writeup is posted on Medium - / cyberw1ng
Disclaimer:
The content shared in this video is intended for educational purposes only. The demonstrations, tutorials, and information presented are meant to highlight common vulnerabilities in cybersecurity systems and are performed in controlled environments, such as the Portswigger Labs, with explicit permission. The primary goal is to enhance knowledge and awareness of potential security threats and vulnerabilities.
Please be aware that attempting to exploit or replicate these techniques without proper authorization may violate applicable laws and regulations. The creator of this content does not encourage any illegal activities, and the responsibility for any misuse or consequences arising from these demonstrations lies solely with the viewer.
Always ensure that you have the appropriate permissions before conducting security testing on any system. It is recommended to seek professional advice and authorization from the relevant parties before attempting any penetration testing, ethical hacking, or security research.
The creator disclaims any liability for the misuse or misinterpretation of the information provided in this video. Viewers are encouraged to use this knowledge responsibly and ethically.
Description - Portswigger Lab
This lab's email change functionality is vulnerable to CSRF. It uses tokens to try to prevent CSRF attacks, but they aren't integrated into the site's session handling system. To solve the lab, use your exploit server to host an HTML page that uses a CSRF attack to change the viewer's email address | Karthikeyan Nagaraj
#cybersecurity #walkthrough #career

Пікірлер
Why Agent Frameworks Will Fail (and what to use instead)
19:21
Dave Ebbelaar
Рет қаралды 33 М.
Hacker101 - JavaScript for Hackers (Created by @STOKfredrik)
24:17
Playing hide and seek with my dog 🐶
00:25
Zach King
Рет қаралды 36 МЛН
Опасность фирменной зарядки Apple
00:57
SuperCrastan
Рет қаралды 12 МЛН
Llegó al techo 😱
00:37
Juan De Dios Pantoja
Рет қаралды 59 МЛН
Install Nessus for Free and scan for Vulnerabilities (New Way)
14:56
Detect Hackers & Malware on your Computer (literally for free)
16:38
Find Information from a Phone Number Using OSINT Tools [Tutorial]
16:59
Is this the best OSINT tool out there?!
17:10
stuffy24
Рет қаралды 324 М.
This is The Fastest Hacking & Recon Tool
10:03
NahamSec
Рет қаралды 12 М.
How Hackers Move Through Networks (with Ligolo)
20:01
John Hammond
Рет қаралды 262 М.
Why You NEED a DRIVER (for hacking games)
8:03
cazz
Рет қаралды 447 М.
Learning Vim in a Week
23:51
thoughtbot
Рет қаралды 463 М.
Looks very comfortable. #leddisplay #ledscreen #ledwall #eagerled
0:19
LED Screen Factory-EagerLED
Рет қаралды 11 МЛН
Лучший браузер!
0:27
Honey Montana
Рет қаралды 1 МЛН
Мой новый мега монитор!🤯
1:00
Корнеич
Рет қаралды 126 М.
#samsung #retrophone #nostalgia #x100
0:14
mobijunk
Рет қаралды 13 МЛН
Vision Pro наконец-то доработали! Но не Apple!
0:40
ÉЖИ АКСЁНОВ
Рет қаралды 172 М.
Сколько реально стоит ПК Величайшего?
0:37