Here we will carry out a CSRF attack on a social networking application called Elgg, which is an open-source platform pre-installed on our virtual machine. While Elgg includes built-in protections against CSRF, these defenses have been disabled for the purpose of this exercise. This session will cover the following topics:
- Cross-Site Request Forgery attack
- CSRF countermeasures: Secret token and Same-site cookie
- HTTP GET and POST requests
- JavaScript and Ajax
- Python
- Ubuntu 20.04 VM
- Docker
- Windows 11 Home (21H2)
Task 1: Observing HTTP Request.
Task 2: CSRF Attack using GET Request.
Task 3: CSRF Attack using POST Request.
Task 4: Enabling Elgg’s Countermeasures