Lecture4 CSRF Flashcards

1
Q

CSRF typically used to ..

A

CREATE, DELETE, UPDATE (or CHANGE)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Both OSRF and CSRF rely on the following:

A

1) Cookies and HTTP authentication info
2) Web page functions which rely on Cookies and HTTP authentication info known by the web browser
3) Knowledge of valid web app URLS
4) The existence of HTML elements which call
back to server resources.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

OSRF vs CRSF

A

OSRF: Means that an attacker is trying to use something like XSS to create a request on that web page itself i.e. the code that generates the request is posted on the same server as the site that you are looking to fool the authenticated users
CSRF: looking to have a 3rd party website that generates a request for an object or url
- don’t need to know session id or cookie info

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Black box testing vs Grey box testing

A

Black box testing: you don’t know the code behind MyBank.com. You reverse engineer what is going on step by step
Grey box testing: you do have access to some code

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is a nonce?

A

A one-time key e.g. per-session nonce, per-request nonce

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

CSRF Mitigation Do’s

A
  1. Generate a unique nonce for each form.

2. Same origin policy HTTP header.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

CSRF Mitigation Do Not’s

A
  1. Secret Cookie
  2. Accepting only POST Requests
  3. Multi-Step Transactions
  4. URL Rewriting
  5. HTTPS
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

How to protect yourself from CSRF attacks

A
  1. Log out of applications
  2. Change default passwords
  3. Different browser for sensitive browsing
  4. Virtual Machine
How well did you know this?
1
Not at all
2
3
4
5
Perfectly