Performing CSRF Exploits Over GraphQL

Поделиться
HTML-код
  • Опубликовано: 26 сен 2024

Комментарии • 10

  • @mnageh-bo1mm
    @mnageh-bo1mm 4 месяца назад +3

    what? most endpoints I came across were using content type json triggering a preflight request which killed any attempt of csrf

    • @intigriti
      @intigriti  4 месяца назад

      It's probably uncommon, Portswigger stated:
      "POST requests that use a content type of application/json are secure against forgery as long as the content type is validated. However, alternative methods such as GET, or any request that has a content type of x-www-form-urlencoded"
      Worth a try! 🙏

    • @mnageh-bo1mm
      @mnageh-bo1mm 4 месяца назад

      @@intigriti thx ... Looks like it's validated too.

  • @jaywandery9269
    @jaywandery9269 2 месяца назад

    My generated CSRF POC is not auto submitting the form. I have to press the submit button for the exploit to work, hence the lab won't solve.

    • @intigriti
      @intigriti  2 месяца назад +1

      Does it look like the PoC used in the video?

  • @LearnTv-qy5xb
    @LearnTv-qy5xb 3 месяца назад

    Nice

  • @mnageh-bo1mm
    @mnageh-bo1mm 4 месяца назад +1

    Nice video tho

    • @intigriti
      @intigriti  4 месяца назад +1

      Appreciate it 💜