Now that we know what the attacks are trying to accomplish, we have the distinct privilege of testing and validating that these vulnerabilities exist or not. In this section, I'll provide some guidance on how best to achieve comprehensive coverage in your scans for these capabilities, but we'll also look into how we can exploit them for black-box attacks and systemic pen testing scopes.
Picking on the little guys
Sea-surfing on someone else's board
CSRF attacks (sometimes pronounced sea-surf) hide the actual intent of a referred action and bury it in a forged request. The user wants to believe the page as-rendered (because hey, it came from my trusted web app!) and thus has no reason to investigate the underlying...