Summary

In this chapter, we looked at different ways to discover and exploit CSRF vulnerabilities. When testing for websites, always look around to test anti-CSRF tokens and their implementation—most of the time some endpoint or another misses proper checks and so on.

In the next chapter, we'll take a look at different ways to exploit SQL injection vulnerabilities. We are mainly going to cover the popular and robust exploitation tool SQLMap.

Get Mastering Modern Web Penetration Testing now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.