How does a CSRF attack work and what are the potential consequences for a web application and its users?
Saturday, 05 August 2023 by EITCA Academy
A Cross-Site Request Forgery (CSRF) attack is a type of web attack that exploits the trust a web application has in a user's browser. In this attack, an attacker tricks a victim into performing unwanted actions on a web application without the victim's knowledge or consent. CSRF attacks can have severe consequences for both the
- Published in Cybersecurity, EITC/IS/WAPT Web Applications Penetration Testing, Web attacks practice, CSRF - Cross Site Request Forgery, Examination review
Tagged under: CSRF Protection, Cyber Threats, Cybersecurity, Web Application Security, Web Security, Web Vulnerabilities
How can simple requests be distinguished from preflighted requests in terms of server security?
Saturday, 05 August 2023 by EITCA Academy
In the realm of server security, distinguishing between simple requests and preflighted requests is important to ensure the integrity and protection of web applications. Simple requests and preflighted requests are two types of HTTP requests that differ in their characteristics and security implications. Understanding these distinctions allows server administrators to implement appropriate security measures and
- Published in Cybersecurity, EITC/IS/WASF Web Applications Security Fundamentals, Server security, Local HTTP server security, Examination review
Tagged under: Access-Control-Request-Headers, Access-Control-Request-Method, CORS Policies, Cross-Origin Resource Sharing (CORS), Cross-Site Scripting (XSS), Custom Headers, Cybersecurity, Header Injection, HTTP Methods, HTTP Requests, Input Validation, Output Encoding, Preflighted Requests, Server Security, Simple Requests, SQL Injection, Web Vulnerabilities

