Lab: CSRF with SameSite Strict BYPASS via client-side redirect

Поделиться
HTML-код
  • Опубликовано: 15 ноя 2024

Комментарии • 12

  • @zabirabdullah8975
    @zabirabdullah8975 Год назад +2

    Thanks for the clear explanation. This is an underrated video.

    • @netletic
      @netletic  Год назад +2

      thanks Zabir, really appreciate that, glad it was helpful!

  • @gopikanna_
    @gopikanna_ Год назад +1

    Content was explained good. Thank you!

    • @netletic
      @netletic  Год назад +1

      thanks @gopikanna_!

  • @muhammadadel9537
    @muhammadadel9537 2 месяца назад

    Simple and clear

  • @_Shubham....-----------------6
    @_Shubham....-----------------6 6 месяцев назад

    Very neatly explained. Loved it❤

  • @donkirito7843
    @donkirito7843 Год назад +1

    bro that was super helpful thanks a lot and i hope to see more from you

    • @netletic
      @netletic  Год назад

      thank you @donkirito7843! ☺️

  • @AtulRawatpredator
    @AtulRawatpredator 6 месяцев назад

    @jarno - When you delivered the exploit using a exploit server, the target website has different origin than the attacker website(exploit server). My question is that in this situation, the request shouldn’t work because its a cross origin request and the samesite cookie is set to STRICT.
    Am I missing anything here ?

  • @余哟哟
    @余哟哟 6 месяцев назад

    Content was explained good. But I wan to know weather it can be defence?

  • @4x_mhnd
    @4x_mhnd 4 месяца назад

    GOAT💥

  • @ascaniotrovatoakadh60m97
    @ascaniotrovatoakadh60m97 4 месяца назад

    nice