当前位置:网站首页>Why is your money transferred? This article tells you the answer
Why is your money transferred? This article tells you the answer
2020-11-09 14:35:00 【Yijing Technology】
The content of this article is , Mainly about CSRF.
01 What is? CSRF?
CSRF, Full name Cross-site request forgery, Translation is cross site request forgery , It refers to the use of the identity authentication information of the victim that has not been invalidated (cookie、 Conversation, etc ), Trick them to click malicious links or visit the page containing the attack code , To... As a victim without the victim's knowledge ( The identity authentication information corresponds to ) The server sends the request , So as to complete the illegal operation ( Such as transfers 、 Change the secret, etc ).
CSRF The attack principle is as follows :
■ The user opens the browser , Access to login trusted A Website
■ After the user information has been verified , The server will return a cookie To the browser , Users log on to the website A success , Can send request to website normally A
■ The user did not exit the website A, In the same browser , Open a dangerous website B
■ Website B After receiving the user's request , Return some malicious code , And make a request to visit the website A
■ After the browser receives the malicious code , Without the user's knowledge , utilize cookie Information , To the website A Send a malicious request , Website A Will be based on cookie The information processes the request with the user's authority , Lead from website B The malicious code was executed . It's too official , Simply put, it's through construction URL What caused the attack was CSRF, With the target cookie To carry out our attack .
02 Why did your money get transferred ?
Now there are Zhang San and Li Si transferring money .
1、 Zhang San gives Li Si 100 block , The operation to be performed is :
xxx/transfer.php?from= Zhang San &money=100&to= Li Si
Note that Zhang San doesn't close the page .
2、 Hackers want to transfer money to themselves , The operation to be performed is :
xxx/transfer.php?from= Zhang San &money=100&to= hackers
Obviously it will fail , This is because Zhang San will log in to the system through cookie, Put your own session Pass it to the background server . At this point, the system checks the current session Identity in , He turned it down when he found it was incorrect .
3、 Hackers continue to think of ways , Use bad websites to induce :
The links to the website are very colorful , Let Zhang San can't stop , So I click on the induction link A. At this point, the information returned to the hacker is :
If Zhang Sangang had just transferred money to Li Si , And the page hasn't been closed yet , Just click on this link , The above operation will be performed . This is because the hacker's identity at this time is Zhang San's information , The bank didn't know it was Zhang San , So he accepted the request .
03 How to dig CSRF Loophole
CSRF It is used to operate beyond authority , The vulnerability is in a place where there is permission control , Its structure URL perhaps get Submit , Can be measured .
Black box
Open the page of non static operation , Grab the bag to see if it exists token, without token, Request this page directly , No referer, If the returned data is the same , That means it's very likely that CSRF There's a leak .
White box
Read the code to see if there is validation in the core file token and referer Related code . You can search for token keyword .
Using tools —— Semi automatic detection CSRF
Use CSRFTester course
https://www.sogou.com/link?url=DSOYnZeCC_p8qT7bQ6Ez_IrwkGJvRRLdYQYE4_vHjb03UFOatHCO_d9GQw9zhM_U
Download address :http://www.mediafire.com/file/3j9kbyd3rtardq5/CSRFTester-1.0-src.zip/file
If you're zero based , I want to study systematically and deeply CSRF Loophole , It is highly recommended that you sign up for the training camp specially designed for Xiaobai by Hetian Wangan students ——3 God 《 Compulsory training camp for hackers 》, Limited time benefits for all fans , Only 2 Cents You can sign up for .
The cycle of the training camp is 10 month 21 Japan -10 month 23 On the afternoon of Sunday 3 Point to 4 spot , The teacher will start from 0 The foundation takes you to learn CSRF, Friends can directly scan the code to sign up !
This course offers
▲ The course will be replayed forever , For you to watch over and over again , We can know the new firmly
▲ After class shooting range assignment of supporting courses : The teacher explains the key points of homework regularly 、 difficulty , Make sure the trainees really grasp the knowledge they have learned !
▲ Q & a service , A high quality learning community , Sharing cutting edge knowledge within class groups , Walking with a group of people , You can go further .
Scan the code to get the learning materials and range address
This course is suitable for students who want to learn how to hack , Learning process , Students must not give up , Study on time in three days , At the same time, in the process of learning, we should take notes with pictures and texts , The most important thing is to practice , practice , practice , So after class, the actual combat assignment of the shooting range must be completed on time .
04 Hackers learn to collect exclusive information package
If you have signed up for this course , Want more hacker learning tools and learning materials , Scan the QR code below and send the application screenshot to get .( I hope the students who have received the materials , Can really use the data , Instead of going straight into the cold !)
meanwhile , If you want to see if you're suitable for entry hackers , You can also scan QR code , We have a complete testing system to help you .
Scan code to get learning materials
版权声明
本文为[Yijing Technology]所创,转载请带上原文链接,感谢
边栏推荐
猜你喜欢
C语言—————三子棋游戏
Rongyun has completed several hundred million RMB round D financing, and will continue to build global cloud communication capability
MES系统在行业应用里区别于传统式管理
Full link stress testing of moral integrity -- the evolution of corpus intelligence
Online course of tutorial system processing is in progress
瞧瞧,这样的『函数』才叫 Pythonic
Rainbow sorting | Dutch flag problem
要我说,多线程事务它必须就是个伪命题!
leetcode算法(1)
Get this template, double your salary
随机推荐
Notes for csp-j / s 2020
IDEA rest-client,会了它我还没打开过postman
大厂面试系列(二):并发编程
Four steps of Android integrated payment
Arthas Install 快速安装文档
Android 集成支付的四部曲
我叫Mongo,收了「查询基础篇」,值得你拥有
Embedded assembly in IOS
Android NDK development and actual combat WeChat official account 2-D code detection
03. Priority link model
Learn with me. NETCORE EF core practical introduction, a look will
Interface tests how to pass files in post requests
jackson、fastjson、kryo、protostuff等序列化工具性能对比
乘风破浪的技术大咖再次集结 | 腾讯云TVP持续航行中
堆重启_uaf_hacknote
解密未来数据库设计:MongoDB新存储引擎WiredTiger实现(事务篇)
程序员买房前后对比,看完后已哭瞎...
Application of EMQ X in the Internet of things platform of China Construction Bank
The technology masters who ride the wind and waves gather again | Tencent cloud TVP continues to sail
Efficient estimation of word representations in vector space