ycliper

Популярное

Музыка Кино и Анимация Автомобили Животные Спорт Путешествия Игры Юмор

Интересные видео

2025 Сериалы Трейлеры Новости Как сделать Видеоуроки Diy своими руками

Топ запросов

смотреть а4 schoolboy runaway турецкий сериал смотреть мультфильмы эдисон
Скачать

Portswigger - GraphQL API Vulnerabilities - Lab #5 Performing CSRF exploits over GraphQL

Автор: Popo Hack

Загружено: 2023-08-26

Просмотров: 5389

Описание: Hello Hackers, in this video of Performing CSRF exploits over GraphQL you will see how to exploit and discover GraphQL injection basics

⚠️ Subscribe to my channel ➡️‪@popo_hack‬ ⚠️

0:00 - About the Lab
1:29 - Mapping the lab
3:27 - Convert GraphQL API to Request API
7:25 - CSRF attack

🔍 About the Lab
Lab: Performing CSRF exploits over GraphQL
Level: Paractitioner
The lab uses user management functions for this lab are powered by a GraphQL endpoint. we will convert GraphQL requets into API request request with a content-type of x-www-form-urlencoded and is therefore vulnerable to cross-site request forgery (CSRF) attacks. Will see how to create CSRF attack using HTML file and send it to the target

⚠️ Recommendation
It recommends that you install the InQL extension before attempting this lab to make it easier to modify GraphQL queries in Repeater, and enables you to scan the API schema.Y ou can watch my previous video to know how to use this extension ➡️    • Portswigger - GraphQL API Vulnerabilities ...   ✅

✅ What to do ?
1. Go to "My account" and connect as Wiener user

2. Interpect the update email request, note that uese GraphQL endpoint.

3. Change content type from "application/json" to "application/x-www-form-urlencoded"

4. Mody the body json into the URL format, send the request and check it works fine

5. If you are using Por edition than click right and go to "engagement tools" than "Genrate CSRF PoC", else if you use Community edition, go to your code editor, and right you HTML code (see the code in video)

6. Copy the HTML and go to "GO to exploit server" and send it to the target

Thank you for watching my video, if you have any questions or any topics recommendation feel free to write them on the comment below 🙋

#WebSecurityAcademy #portswigger #GraphQL #vulnerability

Не удается загрузить Youtube-плеер. Проверьте блокировку Youtube в вашей сети.
Повторяем попытку...
Portswigger - GraphQL API Vulnerabilities - Lab #5 Performing CSRF exploits over GraphQL

Поделиться в:

Доступные форматы для скачивания:

Скачать видео

  • Информация по загрузке:

Скачать аудио

Похожие видео

Portswigger - GraphQL API Vulnerabilities - Lab #3 Finding a hidden GraphQL endpoint

Portswigger - GraphQL API Vulnerabilities - Lab #3 Finding a hidden GraphQL endpoint

Finding Your Next Bug: GraphQL

Finding Your Next Bug: GraphQL

Portswigger - GraphQL API Vulnerabilities - Lab #1 Accessing Private GraphQL posts

Portswigger - GraphQL API Vulnerabilities - Lab #1 Accessing Private GraphQL posts

Portswigger - Web Security Academy - GraphQL API Vulnerabilities

Portswigger - Web Security Academy - GraphQL API Vulnerabilities

Лаборатория PortSwigger: поиск и использование неиспользуемой конечной точки API.

Лаборатория PortSwigger: поиск и использование неиспользуемой конечной точки API.

Performing CSRF Exploits Over GraphQL

Performing CSRF Exploits Over GraphQL

Performing CSRF exploits over GraphQL

Performing CSRF exploits over GraphQL

Portswigger - GraphQL API Vulnerabilities - Lab #4 Bypassing GraphQL brute force protections

Portswigger - GraphQL API Vulnerabilities - Lab #4 Bypassing GraphQL brute force protections

Lab: Exploiting HTTP request smuggling to bypass front-end security controls, TE.CL vulnerability

Lab: Exploiting HTTP request smuggling to bypass front-end security controls, TE.CL vulnerability

Software simplicity is an illusion...

Software simplicity is an illusion...

Raspberry Pi Laptop: Great execution, terrible timing

Raspberry Pi Laptop: Great execution, terrible timing

Finding a Hidden GraphQL Endpoint

Finding a Hidden GraphQL Endpoint

Portswigger — Загрузка файлов — Лабораторная работа №1 Удаленное выполнение кода через загрузку ч...

Portswigger — Загрузка файлов — Лабораторная работа №1 Удаленное выполнение кода через загрузку ч...

Bill Gates FURIOUS As Windows 11 Backlash EXPLODES And Partners ABANDON Microsoft

Bill Gates FURIOUS As Windows 11 Backlash EXPLODES And Partners ABANDON Microsoft

GraphQL API Vulnerabilities: Performing CSRF exploits over GraphQL

GraphQL API Vulnerabilities: Performing CSRF exploits over GraphQL

GraphQL Security for Beginners

GraphQL Security for Beginners

How Bug Hunters Map GraphQL APIs? | PART 1

How Bug Hunters Map GraphQL APIs? | PART 1

Portswigger - Information Disclosure - Lab #5 Information disclosure in version control history

Portswigger - Information Disclosure - Lab #5 Information disclosure in version control history

NVIDIA’s New AI: Deleting Reality

NVIDIA’s New AI: Deleting Reality

Portswigger - API Testing - Lab #3 Finding and exploiting an unused API endpoint

Portswigger - API Testing - Lab #3 Finding and exploiting an unused API endpoint

© 2025 ycliper. Все права защищены.



  • Контакты
  • О нас
  • Политика конфиденциальности



Контакты для правообладателей: [email protected]