当前位置:网站首页>Why is your money transferred? This article tells you the answer
Why is your money transferred? This article tells you the answer
2020-11-09 14:35:00 【Yijing Technology】
The content of this article is , Mainly about CSRF.
01 What is? CSRF?
CSRF, Full name Cross-site request forgery, Translation is cross site request forgery , It refers to the use of the identity authentication information of the victim that has not been invalidated (cookie、 Conversation, etc ), Trick them to click malicious links or visit the page containing the attack code , To... As a victim without the victim's knowledge ( The identity authentication information corresponds to ) The server sends the request , So as to complete the illegal operation ( Such as transfers 、 Change the secret, etc ).
CSRF The attack principle is as follows :
■ The user opens the browser , Access to login trusted A Website
■ After the user information has been verified , The server will return a cookie To the browser , Users log on to the website A success , Can send request to website normally A
■ The user did not exit the website A, In the same browser , Open a dangerous website B
■ Website B After receiving the user's request , Return some malicious code , And make a request to visit the website A
■ After the browser receives the malicious code , Without the user's knowledge , utilize cookie Information , To the website A Send a malicious request , Website A Will be based on cookie The information processes the request with the user's authority , Lead from website B The malicious code was executed . It's too official , Simply put, it's through construction URL What caused the attack was CSRF, With the target cookie To carry out our attack .
02 Why did your money get transferred ?
Now there are Zhang San and Li Si transferring money .
1、 Zhang San gives Li Si 100 block , The operation to be performed is :
xxx/transfer.php?from= Zhang San &money=100&to= Li Si
Note that Zhang San doesn't close the page .
2、 Hackers want to transfer money to themselves , The operation to be performed is :
xxx/transfer.php?from= Zhang San &money=100&to= hackers
Obviously it will fail , This is because Zhang San will log in to the system through cookie, Put your own session Pass it to the background server . At this point, the system checks the current session Identity in , He turned it down when he found it was incorrect .
3、 Hackers continue to think of ways , Use bad websites to induce :
The links to the website are very colorful , Let Zhang San can't stop , So I click on the induction link A. At this point, the information returned to the hacker is :
If Zhang Sangang had just transferred money to Li Si , And the page hasn't been closed yet , Just click on this link , The above operation will be performed . This is because the hacker's identity at this time is Zhang San's information , The bank didn't know it was Zhang San , So he accepted the request .
03 How to dig CSRF Loophole
CSRF It is used to operate beyond authority , The vulnerability is in a place where there is permission control , Its structure URL perhaps get Submit , Can be measured .
Black box
Open the page of non static operation , Grab the bag to see if it exists token, without token, Request this page directly , No referer, If the returned data is the same , That means it's very likely that CSRF There's a leak .
White box
Read the code to see if there is validation in the core file token and referer Related code . You can search for token keyword .
Using tools —— Semi automatic detection CSRF
Use CSRFTester course
https://www.sogou.com/link?url=DSOYnZeCC_p8qT7bQ6Ez_IrwkGJvRRLdYQYE4_vHjb03UFOatHCO_d9GQw9zhM_U
Download address :http://www.mediafire.com/file/3j9kbyd3rtardq5/CSRFTester-1.0-src.zip/file
If you're zero based , I want to study systematically and deeply CSRF Loophole , It is highly recommended that you sign up for the training camp specially designed for Xiaobai by Hetian Wangan students ——3 God 《 Compulsory training camp for hackers 》, Limited time benefits for all fans , Only 2 Cents You can sign up for .
The cycle of the training camp is 10 month 21 Japan -10 month 23 On the afternoon of Sunday 3 Point to 4 spot , The teacher will start from 0 The foundation takes you to learn CSRF, Friends can directly scan the code to sign up !
This course offers
▲ The course will be replayed forever , For you to watch over and over again , We can know the new firmly
▲ After class shooting range assignment of supporting courses : The teacher explains the key points of homework regularly 、 difficulty , Make sure the trainees really grasp the knowledge they have learned !
▲ Q & a service , A high quality learning community , Sharing cutting edge knowledge within class groups , Walking with a group of people , You can go further .
Scan the code to get the learning materials and range address
This course is suitable for students who want to learn how to hack , Learning process , Students must not give up , Study on time in three days , At the same time, in the process of learning, we should take notes with pictures and texts , The most important thing is to practice , practice , practice , So after class, the actual combat assignment of the shooting range must be completed on time .
04 Hackers learn to collect exclusive information package
If you have signed up for this course , Want more hacker learning tools and learning materials , Scan the QR code below and send the application screenshot to get .( I hope the students who have received the materials , Can really use the data , Instead of going straight into the cold !)
meanwhile , If you want to see if you're suitable for entry hackers , You can also scan QR code , We have a complete testing system to help you .
Scan code to get learning materials
版权声明
本文为[Yijing Technology]所创,转载请带上原文链接,感谢
边栏推荐
- 基于synchronized锁的深度解析
- SEO builders, what are the unspeakable hardships?
- Get this template, double your salary
- Rainbow sorting | Dutch flag problem
- jackson、fastjson、kryo、protostuff等序列化工具性能对比
- Chinese programmer vs Japanese programmer, full screen shame!
- JS method of judging object type_ How to use typeof_ How to use instanceof_ How to use constructor_ Object.prototype.toString How to use ()
- MES系统在工厂生产管理起到9大很重要的作用
- AutoCAD2020 完整版安装图文教程、注册激活破解方法
- 基于Chef InSpec的基础设施测试
猜你喜欢
Get this template, double your salary
Application of EMQ X in the Internet of things platform of China Construction Bank
What are the implementations of distributed locks?
Decision tree algorithm theory
Leetcode algorithm (1)
EMQ X 在中国建设银行物联网平台中的应用EMQ X 在中国建设银行物联网平台中的应用
Rainbow sorting | Dutch flag problem
Mobile security reinforcement helps app achieve comprehensive and effective security protection
Online course of tutorial system processing is in progress
Android字节跳动一面,被面试官吊打!幸得美团内推,三面拿到offer
随机推荐
Autocad2020 full version installation text course, registration activation cracking method
Tutorial system unity online course double 11 preferential registration is in progress
MES系统在工厂生产管理起到9大很重要的作用
「代码整洁之道-程序员的职业素养」读书笔记
Full link stress testing of moral integrity -- the evolution of corpus intelligence
毕业一年后接私活赚了10w,还拿了几家大厂offer!
中国程序员 VS 日本程序员,满屏的羞羞!
Learning history of C language
spark学习(二)--作业调度和shuffle解析
Several methods of initializing singleton variable in go language
The use of Android studio Aidl
Idea rest client, yes, I haven't opened postman yet
使用art-Template模板获取天气预报信息
要我说,多线程事务它必须就是个伪命题!
你这么不努力,怎么做年薪40W的大数据打工人?
CAD2016软件安装教程
Decrypting the future database design: implementation of mongodb's new storage engine wiredtiger (transaction)
瞧瞧,这样的『函数』才叫 Pythonic
7-10倍写入性能提升:剖析WiredTiger数据页无锁及压缩黑科技
Android studio AVD