Overview
Syllabus
Intro
If you can predict all the parameters for an action, you can fake it
High Level Defenses (Design Patterns)
Primary Defense is the Synchronizer Token Pattern
Second Defensive Option is Double Submit Cookies This option used less often, but useful for things like REST
A Third Option is Any Form of Challenge Response System Rarely Used Exclusively for CSRF Defense
CSRFGuard Implements the Synchronizer Token Pattern and Makes a New Token For Each Session
Tomcat 7 Includes a CSRF Prevention Filter
F5's ASM Can Insert a Token in All Links and Forms to Implement the Synchronizer Token Pattern
Imperva Secure Sphere Can Detect CSRF Attacks by Checking the Referrer Header
CSRF Token Names Can Reveal What Library You Are Using
Taught by
OWASP Foundation