Learn to Hack
search
Ctrlk
  • Introduction
    • 💀whoami
    • Writeupschevron-right
  • Where to Start?
    • Learn to hack
    • Web Basics
    • HTTP Basics
    • Networking Basics
    • Linux Basics
    • Programming Basics
    • Hacking and its types
    • Phases of hacking
    • Bug Bountychevron-right
  • Learn Hacking
    • Platforms to learn hacking
    • Courses for hacking and cybersecurity
    • Youtube Channels CyberSecurity
    • Bug Bounty Writeups
    • Security Books
    • Security Blogs
    • Security News
  • Practice Hacking
    • Practice hacking skills
  • Security Bugs
    • GQL GraphQL
    • Exploit Payment Gateways
    • Unrestricted File Uploadchevron-right
    • XSS Cross Site Scriptingchevron-right
    • CSRF Cross Site Request Forgerychevron-right
      • Real world reports PoCs
    • SSRF Server Side Request Forgerychevron-right
    • BAC Broken Access Control
    • BOLA Broken Object Level Authorization
    • SQLi SQL Injectionchevron-right
    • RCE Remote Code Executionchevron-right
    • IDOR Insecure Direct Object Referencechevron-right
  • Security Tools
    • Reconchevron-right
    • Exploitationchevron-right
    • Setup Burp Collaborator Server
    • Miscellaneouschevron-right
  • Security Verification Standards
    • ASVS Application Security Verification Standard
    • MASVS Mobile Application Security Verification Standard
  • Security Testing Guides
    • Rest API Security Checklist
    • Web Application Testing Techniques
    • Web Security Testing Guide
    • Mobile Security Testing Guide
  • Security findings
    • Security Articles
  • Special Thanks
gitbookPowered by GitBook
block-quoteOn this pagechevron-down
  1. Security Bugschevron-right
  2. CSRF Cross Site Request Forgery

Real world reports PoCs

You can read these real world CSRF PoCs to better understand how the bug is exploited in the real world scenarios.

  • CSRF Account Takeover famebitarrow-up-right by Hassan Khan

  • Hacking PayPal Accounts with one click (Patched)arrow-up-right by Yasser Ali

  • Add tweet to collection CSRFarrow-up-right by vijay kumar

  • Facebookmarketingdevelopers.com: Proxies, CSRF Quandry and API Funarrow-up-right by phwd

  • How i Hacked your Beats account ? Apple Bug Bountyarrow-up-right by @aaditya_purani

  • Paypal bug bounty: Updating the Paypal.me profile picture without consent (CSRF attack)arrow-up-right by Florian Courtial

  • CSRF Account Takeoverarrow-up-right by Vulnerables

  • Uber CSRF Account Takeoverarrow-up-right by Ron Chan

  • Messenger.com CSRF that show you the steps when you check for CSRFarrow-up-right by Jack Whitton

Reference: https://whoami.securitybreached.org/2019/06/03/guide-getting-started-in-bug-bounty-hunting/arrow-up-right

PreviousCSRF Cross Site Request Forgerychevron-leftNextSSRF Server Side Request Forgerychevron-right

Last updated 4 years ago