What is this type of attack (that can use either HTTP G…

An attacker changes the profile information of a particular user (victim) on the target website. The attacker uses
this string to update the victim’s profile to a text file and then submit the data to the attacker’s database.
<iframe src=”http://www.vulnweb.com/updateif.php” style=”display:none”></iframe>
What is this type of attack (that can use either HTTP GET or HTTP POST) called?

An attacker changes the profile information of a particular user (victim) on the target website. The attacker uses
this string to update the victim’s profile to a text file and then submit the data to the attacker’s database.
<iframe src=”http://www.vulnweb.com/updateif.php” style=”display:none”></iframe>
What is this type of attack (that can use either HTTP GET or HTTP POST) called?

A.
Cross-Site Request Forgery

B.
Cross-Site Scripting

C.
SQL Injection

D.
Browser Hacking

Explanation:
Cross-site request forgery, also known as one-click attack or session riding and abbreviated as CSRF
(sometimes pronounced sea-surf) or XSRF, is a type of malicious exploit of a website where unauthorized
commands are transmitted from a user that the website trusts.
Different HTTP request methods, such as GET and POST, have different level of susceptibility to CSRF attacks
and require different levels of protection due to their different handling by web browsers.
https://en.wikipedia.org/wiki/Cross-site_request_forgery



Leave a Reply 1

Your email address will not be published. Required fields are marked *


Mak

Mak

Looks like a combination of CSRF and XSS: first it updates the victim’s profile on the victim’s website, second it submits the profile to the ATTACKER’S database (stealing the profile data).