May 2023
Intermediate to advanced
320 pages
7h 42m
English
When attackers execute hijacking and forgery-based attacks against servers and clients, they can take sensitive actions with potentially devastating outcomes. In this chapter, we’ll test for these vulnerabilities and learn about defenses an application might implement to mitigate these types of flaws.
Request forgery occurs when an attacker is able to carry out an action, ideally a sensitive one, on behalf of a client or server. When attackers target clients, they may, for example, try to force the client to transfer money to a digital wallet or bank account that they control. When attackers target servers, ...
Read now
Unlock full access