diff --git a/CSRF injection/Images/CSRF-CheatSheet.png b/CSRF injection/Images/CSRF-CheatSheet.png new file mode 100644 index 0000000..eef946e Binary files /dev/null and b/CSRF injection/Images/CSRF-CheatSheet.png differ diff --git a/CSRF injection/README.md b/CSRF injection/README.md new file mode 100644 index 0000000..50e3e28 --- /dev/null +++ b/CSRF injection/README.md @@ -0,0 +1,93 @@ +# Cross-Site Request Forgery + +> Cross-Site Request Forgery (CSRF) is an attack that forces an end user to execute unwanted actions on a web application in which they're currently authenticated. CSRF attacks specifically target state-changing requests, not theft of data, since the attacker has no way to see the response to the forged request. - OWASP + + +## Summary + +* [Methodology](#methodology) +* [Payloads](#payloads) + +## Methodology + +![CSRF_cheatsheet](https://github.com/swisskyrepo/PayloadsAllTheThings/raw/master/CSRF%20injection/Images/CSRF-Cheatsheet.jpg) + +## Payloads + +### HTML GET – Requiring User Interaction for Proof-of-Concept + +```html +Click Me +``` + +### HTML GET (No User Interaction) + +```html + +``` + +### HTML POST – Requiring User Interaction for Proof-of-Concept + +```html +
+``` + +### HTML POST (AutoSubmit – No User Interaction) + +```html + + + +``` + + +### JSON GET – Simple Request + +```html + +``` + +### JSON POST – Simple Request + +```html + +``` + +### JSON POST – Complex Request + +```html + +``` + + +## References + +- [Cross-Site Request Forgery Cheat Sheet - Alex Lauerman - April 3rd, 2016](https://trustfoundry.net/cross-site-request-forgery-cheat-sheet/) +- [Cross-Site Request Forgery (CSRF) - OWASP](https://www.owasp.org/index.php/Cross-Site_Request_Forgery_(CSRF)) \ No newline at end of file diff --git a/README.md b/README.md index 66c0bb2..ceb920c 100644 --- a/README.md +++ b/README.md @@ -11,8 +11,9 @@ You can also contribute with a beer IRL or with `buymeacoffee.com` Every section contains: - README.md - vulnerability description and how to exploit it -- Intruders - a set of files to give to Burp Intruder -- Some exploits +- Intruder - a set of files to give to Burp Intruder +- Images - pictures for the README.md +- Files - some files referenced in the README.md You might also like : diff --git a/_template_vuln/README.md b/_template_vuln/README.md index d4fb11d..405a0ca 100644 --- a/_template_vuln/README.md +++ b/_template_vuln/README.md @@ -21,6 +21,6 @@ Quick explanation Exploit ``` -## Reference +## References - [Blog title - Author, Date](https://example.com) \ No newline at end of file