The Hidden CSRF Vulnerability: Why Testing Every Endpoint Matters! (A Must-Watch Lesson) | 2024

Поділитися
Вставка
  • Опубліковано 15 гру 2024

КОМЕНТАРІ • 39

  • @BePracticalTech
    @BePracticalTech  6 місяців тому +3

    Telegram channel link: telegram.me/bepracticaltech

    • @bayunirayudha
      @bayunirayudha 5 місяців тому

      .b.i.n.a. .s.a.r.a.n.a. .i.n.f.o.r.m.a.t.i.k.a.

  • @entertainment_in_blood
    @entertainment_in_blood 5 місяців тому +1

    so if we find CSRFTOKEN used in the request, JWT token, JSON data.. we can determine that it s not vulnrable to CSRF And we can moveon.. but can you explain more parameter through which we can determine that its not vuln to CSRF..

  • @eyezikandexploits
    @eyezikandexploits 5 місяців тому

    Question, how can you tell in the request that itd allow for a csrf i noticed none of the responses showed a samesite param or anything like that, even when adding the email. Whats the difference in the responses that allow for csrf besides it being GET and POST, is that the only difference?

  • @vijay_sawant
    @vijay_sawant 6 місяців тому +1

    Thank you

  • @mohan9097
    @mohan9097 5 місяців тому

    Lets assume we have 2 accounts, attacker account in firefox and victim account in chrome. Now from the attacker account, we remove the upi and capture that request in burp and generated an csrf POC. Now if we open csrfpoc.html file in chrome browser, will the victim's upi gets removed ?
    Thats how the impact goes high because removing our own upi will not be an high impact right ? Please explain me on this.
    I am asking this because, There is a unique cookie going to the server to authorize..please explain

    • @BePracticalTech
      @BePracticalTech  5 місяців тому

      Yes, you are correct! Once we have identified the csrf vulnerability, we will simply send the html form to the victim. Once the victim clicks on the submit button, their upi id will be removed!

  • @HammadRafique-y1c
    @HammadRafique-y1c 6 місяців тому

    Which tool have you used for checking requets "Intercept"

  • @eyezikandexploits
    @eyezikandexploits 5 місяців тому

    Great video man

  • @ashikrahman1036
    @ashikrahman1036 6 місяців тому

    happy eid bro❤
    and thanks for this tutorial...

  • @broomandmopmop
    @broomandmopmop 5 місяців тому

    hey bud thanks for the video

  • @l00pzwastaken
    @l00pzwastaken 6 місяців тому

    In this Target 🎯 you are able to remove everyones data ? If yes then that is token based for session then how you are able to remove it?

    • @BePracticalTech
      @BePracticalTech  6 місяців тому

      As shown in the video, this is a csrf vulnerability which means that the victim needs to click on the "submit" button and that will remove the upi id from this web app.

  • @nikilmuchur4031
    @nikilmuchur4031 5 місяців тому

    I need help please tell me how to do this, please explain in ur simple words.. by tonight i have to complete this
    Vulnerability Assessment and Remediation Scenario: Create your own simulated network environment containing several security vulnerabilities. Your task is to identify, document, and propose remediation for these vulnerabilities. Tasks: o Perform a vulnerability scan using tools . o Identify and document all vulnerabilities found. o For each vulnerability, provide: ▪ A description of the vulnerability. ▪ The potential impact on the system. ▪ Steps for remediation.

    • @nikilmuchur4031
      @nikilmuchur4031 5 місяців тому

      I unable to install kali Linux in my laptop...so big issue...

    • @BePracticalTech
      @BePracticalTech  5 місяців тому

      Try using live persistent kali linux

  • @gowtham8774
    @gowtham8774 6 місяців тому

    Can you please make a video for http request smuggling?

  • @Ankitverma-yc7zf
    @Ankitverma-yc7zf 6 місяців тому

    buddy make a video for json content-type in CSRF showing how to bypass this.

  • @csstestusr
    @csstestusr 6 місяців тому

    U able to remove anyone account upi?

  • @newuser2474
    @newuser2474 6 місяців тому

    Are jwt token vulnerable to csrf

    • @BePracticalTech
      @BePracticalTech  6 місяців тому +1

      Not at all. Normally, the ajax request fetch the token and then use it for the rest of the requests. Therefore they are usually safe from CSRF

    • @newuser2474
      @newuser2474 6 місяців тому

      @@BePracticalTech thanks!

  • @IllIIIIIIllll
    @IllIIIIIIllll 4 місяці тому

    The main thing here is that "attributes cookies doesn't have same site" you didn't explain it.

  • @uttarkhandcooltech1237
    @uttarkhandcooltech1237 6 місяців тому

    Love you bhai happ Eid bhai jaan ❤❤❤ nice 👍🏼

  • @AKGaming0
    @AKGaming0 6 місяців тому

    Do you have discord server?

  • @BughunterAryan-h6f
    @BughunterAryan-h6f 2 місяці тому

    batman yadav

  • @jahanajj
    @jahanajj 6 місяців тому

    ❤❤❤❤

  • @SecureByBhavesh
    @SecureByBhavesh 6 місяців тому

    First

  • @codevibe007
    @codevibe007 5 місяців тому

    where i can contact you sir i asking somthing to you

  • @AKGaming0
    @AKGaming0 6 місяців тому

    You need a cookie for removing the UPI I'd, this not big issue in my opinion

    • @BePracticalTech
      @BePracticalTech  6 місяців тому +1

      This is a CSRF vulnerability. As shown in the video, I was able to remove the UPI id.

    • @AKGaming0
      @AKGaming0 6 місяців тому +1

      @@BePracticalTech this content is very high-quality. There is no doubt about it.