Create a Proof of Concept Exploit of a CSRF Vulnerable Website

Mike Sherov
InstructorMike Sherov
Share this video with your friends

Social Share Links

Send Tweet
Published 4 years ago
Updated 3 years ago

In this lesson, we'll learn what a Cross Site Request Forgery (CRSF) vulnerability is by learning how to exploit a CSRF vulnerable site by making malicious requests on behalf of a logged in user. We'll construct a malicious payload that automatically gets POSTed to the vulnerable site simply by visiting the attacker website while being logged into the target website.

Instructor: [00:00] Now that our target site is protected against man in the middle attacks, let's put our attacker hat back on and move on to our next attack, cross-site request forgery, otherwise known as CSRF.

[00:10] A CSRF attack is a form of social engineering in which an attacker tricks the user into visiting the attackers website, which is pretending to be the target site which then submits a malicious request on behalf of the user to the target website.

[00:23] First, let's open another terminal. We can run pseudo npm run start:, enter. This will start a web server at, which is our attackers website. For now, old hassles are linked back to the target website but we want to submit a form.

[00:48] Let's log back in to our target website, putting in our username and password. Our goal is to submit the message, "hacked" instead of the message, "hello." If we view the source of this page, we can see that it contains a form and this form will serve the basis of our attack.

[01:07] I'll copy the form and paste it into the hacker's website and change the action of the form from a relative URL to an absolute URL,, and save. I will also automatically fill in the text area to have the message "hacked."

[01:25] If I visit again and refresh, you can see that I have copied the form and if I now submit it, it will submit the message "hacked" back to What we've just witnessed is a form on the website submitting a form to, and because the user was logged into, the request succeeded.

[01:51] That is, a request from the attacker's website still transmitted the cookies for the target website even though the request originated from the hacker's website. Our attack isn't very good yet because we have to make the user hit the "submit" button, but we can make the form submit itself.

[02:08] We can give the form an ID of "the form," then add a script tag that will select the form and submit it. This is a new trick. If an element has an ID, the browser will automatically create a global variable of the same name that references that element. Our script can just say "theform.submit" and this should submit the form. If I refresh the page, we can see that it worked.

[02:43] As soon as the page loaded, it submitted the form to As an attacker, we still have a problem because the user can now see that we've submitted the form.

[02:52] So let's make the form submit to a hidden iframe on the page. That way, when the user visits, they won't get redirected to the target website and they may not even notice that they were hacked. First I'll make an iframe and give it a name, and then I'll give a target to our form and point it to that hidden frame and save.

[03:19] What this will do when I go back to is it now no longer redirects the top frame, but now has an iframe embedded inside of it with a posted message. Let's hide this whole thing. We can come back here and we'll wrap it in a div with the hidden attribute and we'll save that.

[03:41] We'll refresh our page one last time and now it should be submitting to a hidden iframe via hidden form. If we go back to after refreshing about a dozen times on, we can see that each time it's submitting our hacked message, thereby completing our CSRF attack.

~ 4 years ago

The cookie in the iframe won't work unless we'll add to the cookie object the property sameSite with the value "none"

Jeremiah Trein
Jeremiah Trein
~ 4 years ago

Yes, same as Allen. Seems the browser is handling this for me. I am using Chrome Version 87.0.4280.67

Jeremiah Trein
Jeremiah Trein
~ 4 years ago

Update: The instructor does make note of this "lax" default in browsers at the end of lesson #8.

Markdown supported.
Become a member to join the discussionEnroll Today