YoVDO

Dissecting CSRF Attacks & Countermeasures

Offered By: Black Hat via YouTube

Tags

Black Hat Courses Cross-Site Request Forgery (CSRF) Courses Web Application Security Courses Content Security Policy (CSP) Courses

Course Description

Overview

Explore the intricacies of Cross Site Request Forgery (CSRF) attacks and countermeasures in this 47-minute Black Hat USA 2013 conference talk. Delve into the challenges of implementing effective CSRF protections and the difficulties in detecting vulnerabilities through automated tools. Learn how to model attacks to validate countermeasure effectiveness, and discover a proposed new header-based policy introducing Storage Origin Security (SOS) for cookies and session objects. Gain insights into simplifying CSRF prevention at the HTTP layer, potentially improving web security without extensive HTML modifications. Examine topics such as cross-origin requests, user-intended actions, strong secrets, CSRF tokens, mobile app considerations, and Content Security Policy. Witness demonstrations and explore real-world examples, including WordPress countermeasures and social engineering aspects.

Syllabus

Introduction
CrossOrigin Requests
User Intended Actions
Countermeasures
Strong Secret
Secrets
Random Number Generators
CSRF Tokens
Mobile Apps
Passive Static Testing
CSRF Token Swapping
CrossOrigin Resource Sharing
Drawbacks
Objections
Browser Check
Content Security Policy
SOS
Syntax
Do Not Track
Set Cookie Editor
Cookie Policies
Isolated Policies
Default Policies
Exceptions
Origin Request
Demo Watch
SOS Policy
Demo
Behind the Scenes
WordPress Countermeasures
Social Engineering
Summary
Browsers
Final comments


Taught by

Black Hat

Related Courses

Fixing XSS with Content Security Policy
LASCON via YouTube
OWASP Top 10 for JavaScript Developers
OWASP Foundation via YouTube
Don't Trust the DOM - Bypassing XSS Mitigations via Script Gadgets
OWASP Foundation via YouTube
Breaking Microsoft Edge Extensions Security Policies
media.ccc.de via YouTube
Browser Security and HTTP Headers - Attacks and Protections in Action
Devoxx via YouTube