<?xml version="1.0" encoding="UTF-8"?>        <rss version="2.0"
             xmlns:atom="http://www.w3.org/2005/Atom"
             xmlns:dc="http://purl.org/dc/elements/1.1/"
             xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
             xmlns:admin="http://webns.net/mvcb/"
             xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#"
             xmlns:content="http://purl.org/rss/1.0/modules/content/">
        <channel>
            <title>
									What is CSRF? - Cyber Security				            </title>
            <link>https://www.hacktheforum.com/cyber-security/what-is-csrf/</link>
            <description>Hack The Forum Discussion Board</description>
            <language>en</language>
            <lastBuildDate>Fri, 08 May 2026 02:00:29 +0000</lastBuildDate>
            <generator>wpForo</generator>
            <ttl>60</ttl>
							                    <item>
                        <title>What is CSRF?</title>
                        <link>https://www.hacktheforum.com/cyber-security/what-is-csrf/#post-20116</link>
                        <pubDate>Thu, 07 May 2026 17:35:27 +0000</pubDate>
                        <description><![CDATA[CSRF stands for Cross-Site Request Forgery. It’s a type of web security attack where a malicious site tricks a user’s browser into performing an unwanted action on another site where the use...]]></description>
                        <content:encoded><![CDATA[<p><strong data-start="0" data-end="8">CSRF</strong> stands for <strong data-start="20" data-end="50">Cross-Site Request Forgery</strong>. It’s a type of web security attack where a malicious site tricks a user’s browser into performing an unwanted action on another site where the user is already logged in.</p>
<p> </p>
<p data-start="646" data-end="674">CSRF exploits the fact that:</p>
<ul data-start="675" data-end="827">
<li data-section-id="1e9cnf7" data-start="675" data-end="752">Browsers automatically include cookies (like login sessions) with requests.</li>
<li data-section-id="1x8vhv4" data-start="753" data-end="827">Websites often trust those cookies without verifying the request source.</li>
</ul>
<h3 data-section-id="185je9g" data-start="1066" data-end="1095">How websites prevent CSRF</h3>
<p data-start="1096" data-end="1123">Common protections include:</p>
<ul data-start="1124" data-end="1410">
<li data-section-id="4i8l6a" data-start="1124" data-end="1232"><strong data-start="1126" data-end="1141">CSRF tokens</strong> (most important):<br data-start="1159" data-end="1162" />A unique, secret value included in forms that attackers can’t guess.</li>
<li data-section-id="1sslq11" data-start="1233" data-end="1314"><strong data-start="1235" data-end="1255">SameSite cookies</strong>:<br data-start="1256" data-end="1259" />Restr cookies from being sent in cross-site requests.</li>
<li data-section-id="93yj69" data-start="1315" data-end="1364"><strong data-start="1317" data-end="1337">Checking headers</strong> like <code data-start="1343" data-end="1351">Origin</code> or <code data-start="1355" data-end="1364">Referer</code></li>
<li data-section-id="7mwtrc" data-start="1365" data-end="1410"><strong data-start="1367" data-end="1388">Re-authentication</strong> for sensitive actions</li>
</ul>
<p> </p>
<p>CSRF is dangerous because it <strong data-start="1463" data-end="1514">uses your own authenticated session against you</strong>—it doesn’t need to hack your password.</p>]]></content:encoded>
						                            <category domain="https://www.hacktheforum.com/cyber-security/">Cyber Security</category>                        <dc:creator>kajal</dc:creator>
                        <guid isPermaLink="true">https://www.hacktheforum.com/cyber-security/what-is-csrf/#post-20116</guid>
                    </item>
							        </channel>
        </rss>
		