CSRF Defense Strategies - Not All Are Created Equal
Offered By: OWASP Foundation via YouTube
Course Description
Overview
Syllabus
Intro
If you can predict all the parameters for an action, you can fake it
High Level Defenses (Design Patterns)
Primary Defense is the Synchronizer Token Pattern
Second Defensive Option is Double Submit Cookies This option used less often, but useful for things like REST
A Third Option is Any Form of Challenge Response System Rarely Used Exclusively for CSRF Defense
CSRFGuard Implements the Synchronizer Token Pattern and Makes a New Token For Each Session
Tomcat 7 Includes a CSRF Prevention Filter
F5's ASM Can Insert a Token in All Links and Forms to Implement the Synchronizer Token Pattern
Imperva Secure Sphere Can Detect CSRF Attacks by Checking the Referrer Header
CSRF Token Names Can Reveal What Library You Are Using
Taught by
OWASP Foundation
Related Courses
Internet History, Technology, and SecurityUniversity of Michigan via Coursera Client-Server Communication
Google via Udacity HTTP & Web Servers
Udacity Network Security
Georgia Institute of Technology via Udacity Web Security Fundamentals
KU Leuven University via edX