Force authenticated users to execute unwanted actions. State-changing attacks.
Cross-Site Request Forgery (CSRF) is an attack that forces authenticated users to execute unwanted actions on a web application. The attacker tricks the victim's browser into making malicious requests using their existing authentication cookies.
How it works:
📡 Interactive Simulation Mode
More common, requires form submission
Vulnerable application
Ready to Attack
User logs into bank.com (session cookie stored)
Via email
Automatically includes authentication cookie
No CSRF token validation, request processed
OPSEC: Training Environment Only
CSRF attacks are illegal without authorization. Always implement anti-CSRF tokens, SameSite cookies, and origin validation. Never use GET for state-changing operations. OWASP Top 10 vulnerability.