CSRF Summary

1. The principle vulnerability
attackers from forging web pages, cheat logged-on user to operate without the knowledge of the situation.

2. Classification
by requests into: get type, post type
by attacks can be divided into: HTML CSRF, JSON HiJacking, Flash CSRF etc.

3. The method of detecting
normal page header data packet presence or absence HTTP referer field is the same as the page returned

4. The method of Defense

  • Detection referer field
  • Generating a random token
  • Use code
  • Enter the old password confirmation

Guess you like

Origin blog.csdn.net/syy0201/article/details/88881776