3 thoughts on “down town la wholesale jewelry What is a CSRF attack?”

  1. wholesale authentic african jewelry That is, on the page of a malicious site, the visitor requests the visitor to ask for a URL of your website (usually use the post data method) to achieve the purpose of changing the server data. This type of attack depends on the form in your webpage, and the fragile form is easily attacked. For visitors on your website, the following attacks may be subject to:n* Record the log of the attacker outside your website (such as: Slashdot);n* Modify the setting of the attacker on your website (such as: Google);n* Modify your hardware firewall;n* Use the attacker's login information to comment or leave a message on your website;n* Transfer the funds to another user account.nCSRF attacks are typical of those websites that use cookies to record login information, but for some pages (such as internal networks) that allow a certain IP address access, this type of attack will also work.nCSRF attacks are usually used (but not limited to) to realize automatic submissions of cross -site submission of forms -form data can be hidden, and the submission button can be disguised as a link or rolling bar.n* Determine those CGI that accepts the server data only accepts the post parameter and does not accept the GET parameters.n* Determine the form of your own form, you can use a hidden field to store the MD5 string. This string is the result of the MD5 string that logs in to the COOKIE data with the key storage of the server. Only this MD5 string is correct Time to accept the form data;n* In addition, you can add a stricter method: add a hidden field of a timestamp in the form and include it in the hash string. If the timestamp exceeds a certain time, it is considered that the form has expired. When the form expires, a method can be given to the user to submit the form again. For example, the data previously filled in the user is still placed in the form, but using a new hash string.nAn example of a pHP form, form code: u003C? PHP $ key = y8s4z7m2; // md5 encryption key $ time = time (); // The current timen$ hash = md5 ($ Time. $ Key); // Hash string? u003Cform method = "post" action = "comment.php"nu003Cpyour name: u003Cinput type = "text" name = "person_name" /u003C /pnu003CpComment:/u003Ctextarea name = "comment" rows = "10" color = "60" u003C/textarea u003C/pnu003Cinput type = "hidden" name = "time" value = "u003C? php echo $ time;?" / / /nu003Cinput type = "hidden" name = "hash" value = "u003C? php echo $ hash;?" / / /nu003Cp u003Cinput type = "submit" name = "comment" value = "submit comment"/u003C/p u003C/form Form Submit the comment.php background processing program code: u003C? php $ key = y8s4z7m2; // secret The key is consistent with the aboven$ Expire = 1800; // Form Expiration Time: Half an hourn$ my_hash = md5 ($ _ post [time]. $ key); // The correct hash stringnif ($ my_hash! = $ _post [hash]) // Hash string incorrectnDIE (Submit illegal form.);nif (time () -$ _post [time] $ Expire) {n// Forms have expired, generate new timestamps and hash string, and display the form for users to submit them again. (Here is omitted) //….} // Form verification passes, you can accept data submitted by the form and perform other operations.n//….?

  2. los angeles gold jewelry wholesale 1. What is CSRF?
    CSRF (Cross-Site Request Forgery), Chinese name: cross-site request forged, also known as: One Click Attack/Session Riding, abbreviated: CSRF/XSRF.
    . What can I do?
    This can understand the CSRF attack: the attacker stole your identity and send malicious requests in your name. What CSRF can do includes: send emails, send messages, steal your account, even buy goods, virtual currency transfer ... The problems caused include: personal privacy leakage and property security.
    three .csrf vulnerabilities current
    CSRF's attack method has been proposed by security personnel abroad in 2000, but in China, it did not begin to be concerned until 2006. In 2008, many large -scale domestic and foreign large -scale large -scale at home and abroad Community and interactive websites reveal CSRF vulnerabilities, such as: Nytimes (New York Times), (a large Blog website), YouTube and Baidu Hi ... and now many sites on the Internet are still unprepared about this. So that the security industry called CSRF as "sleeping giant".

  3. wholesale clasp jewelry What is the CSRF attack?
    CSRF attack, the full name is "Cross-SITE Request Forgery", the Chinese name is forgery of cross-site requests, also known as "One Click Attack" or "Session Riding". It is usually abbreviated as CSRF or XSRF It is a malicious use of the website. XSS mainly uses trust users in the site, while CSRF uses the trustworthy website by disguising the request from trusted users. Compared with XSS, CSRF is more dangerous.
    csrf attacks?
    The main harm comes from the attacker's stealing user identity and send malicious requests. For example: Simulation users send emails, send messages, payment, transfer, etc.
    On how to defend CSRF attack?
    1. Important data interaction is received with post. Of course, the post is not a panacea. It can be solved to fake a form form.
    2. Use the verification code. As long as it involves data interaction, the verification code verification is available. This method can completely solve the CSRF.
    3. For user experience considerations, the website cannot add the verification code to all operations, so the verification code can only be used as auxiliary means and cannot be used as the main solution.
    4. Verify the HTTP Referer field. This field records the source address of the HTTP request. The most common application is the anti -theft chain.
    5, add token to each form and verify.

Leave a Comment