Dissecting CSRF Attacks & Countermeasures

Dissecting CSRF Attacks & Countermeasures

Black Hat via YouTube Direct link

Summary

32 of 34

32 of 34

Summary

Class Central Classrooms beta

YouTube videos curated by Class Central.

Classroom Contents

Dissecting CSRF Attacks & Countermeasures

Automatically move to the next video in the Classroom when playback concludes

  1. 1 Introduction
  2. 2 CrossOrigin Requests
  3. 3 User Intended Actions
  4. 4 Countermeasures
  5. 5 Strong Secret
  6. 6 Secrets
  7. 7 Random Number Generators
  8. 8 CSRF Tokens
  9. 9 Mobile Apps
  10. 10 Passive Static Testing
  11. 11 CSRF Token Swapping
  12. 12 CrossOrigin Resource Sharing
  13. 13 Drawbacks
  14. 14 Objections
  15. 15 Browser Check
  16. 16 Content Security Policy
  17. 17 SOS
  18. 18 Syntax
  19. 19 Do Not Track
  20. 20 Set Cookie Editor
  21. 21 Cookie Policies
  22. 22 Isolated Policies
  23. 23 Default Policies
  24. 24 Exceptions
  25. 25 Origin Request
  26. 26 Demo Watch
  27. 27 SOS Policy
  28. 28 Demo
  29. 29 Behind the Scenes
  30. 30 WordPress Countermeasures
  31. 31 Social Engineering
  32. 32 Summary
  33. 33 Browsers
  34. 34 Final comments

Never Stop Learning.

Get personalized course recommendations, track subjects and courses with reminders, and more.

Someone learning on their laptop while sitting on the floor.