CSRF - how to find it in 2024? CSRF bug bounty case study

Поделиться
HTML-код
  • Опубликовано: 27 авг 2024

Комментарии • 30

  • @BugBountyReportsExplained
    @BugBountyReportsExplained  5 месяцев назад +4

    Thank you for watching the video! If you enjoyed it, leave a like to let the YT algorithm know you did ;)

    • @trustedsecurity6039
      @trustedsecurity6039 5 месяцев назад

      It could be cool to have your support for premium members or maybe i missed it?

  • @grassy-p12
    @grassy-p12 5 месяцев назад +6

    the way you say enjoy is incredible☺️

  • @dennismunyaka6537
    @dennismunyaka6537 3 месяца назад

    As always great video. I appreciate your effort reading all those reports and summarizing it for us.

  • @keppubgpc
    @keppubgpc 5 месяцев назад +2

    Really Great videos man, your content gives me motivation and fueles me to hunt for bugs

  • @servantofgod3058
    @servantofgod3058 5 месяцев назад +1

    Great video as always ! love your content

  • @e995a1ad
    @e995a1ad 5 месяцев назад +5

    Everybody talks about SameSite, but Storage Partitioning also have a huge impact on CSRF exploitability. Nowadays most CSRFs can only be exploited with a navigation, even with SameSite=None.

    • @normalitee0os
      @normalitee0os 5 месяцев назад +1

      Can You explain more on this buddy?

    • @e995a1ad
      @e995a1ad 5 месяцев назад

      @@normalitee0os All browsers now implement some kind of "State Partitioning", where a site's data (cookies, local storage, session storage...) is no longer stored globally for the site, but relative to the top-level site (the site you can see on your browser's address bar). So when a cross-site request is sent from the attackers domain, the cookie jar for the target site is essentially empty and no cookies are sent at all. A navigation fixes the problem because then you're in a first-party context, but 1) a navigation can only do a GET or a POST 2) a navigation requires a additional gesture (click or keypress) from the victim 3) you can't read the result of a navigation

    • @krizzs2656
      @krizzs2656 5 месяцев назад

      ​@@normalitee0osIt involves isolating data storage (like cookies, cache, etc.) per site or per context to prevent tracking and cross-site attacks. With storage partitioning, even if cookies are marked as SameSite=None (which means they are accessible in requests to the domain they belong to from any site), the partitioning limits their use to only the context in which they were set. This makes it much harder for attackers to perform CSRF attacks, as the attacker's site cannot access the cookies or other storage from the site they are trying to attack.

  • @mateuszp2176
    @mateuszp2176 5 месяцев назад

    Great! I didn't know about this 2 minutes window :)

  • @MFoster392
    @MFoster392 5 месяцев назад +1

    Great info man, Thank you.

  • @monKeman495
    @monKeman495 5 месяцев назад +1

    stored xss with cookie exfil to csrf account deletion is a kind of deadly stuff i seen

  • @mnageh-bo1mm
    @mnageh-bo1mm 5 месяцев назад +2

    ddddddddude we missed you a lot

  • @sumitExplains
    @sumitExplains 4 месяца назад +1

    Hii what software are you using to manage reports . Love your explanation ❤❤

  • @kiedysbedemilionerem2414
    @kiedysbedemilionerem2414 5 месяцев назад +2

    Może jestem głupi ale mógłbyś powiedzieć jak szukać raportów które są publiczne w znaczeniu że można zobaczyć payload, PoC? Chciałbym mieć dużą bazę danych z takimi raportami ale szukać ich manualnie mi się nie chce bo by to zajęło setki godzin

  • @Kshit-u2m
    @Kshit-u2m 3 месяца назад +1

    How do i get this complete notion list ?

  • @Yash15361
    @Yash15361 5 месяцев назад

    thanks for providing quality content :}

  • @amoh96
    @amoh96 5 месяцев назад

    love this case study videos thank you alot 😏

  • @doya8130
    @doya8130 5 месяцев назад

    Thank you for your work

  • @suvanedits
    @suvanedits 3 месяца назад

    Sir which mic you are using

  • @gamingyt8758
    @gamingyt8758 4 месяца назад

    Can u provide me those reports bro

  • @prob_here
    @prob_here 4 месяца назад

    Do on post messages

    • @BugBountyReportsExplained
      @BugBountyReportsExplained  4 месяца назад

      That will be hard because you can't look for postMessage bugs as they are only a communication channel. But, during the XSS case study, I noted which bugs were present due to the postMessage. Maybe, after I do more case studies, I will do like a metaanalysis to see what other bugs were caused by postMessages

  • @aryanair6624
    @aryanair6624 5 месяцев назад

    Thankuuuuu🤌🏻🤌🏻🤌🏻