Skip to content

jayeshchauhan/csrf_poc_generator

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

55 Commits
 
 
 
 
 
 
 
 
 
 
 
 

Repository files navigation

About

Create a PoC for CSRF attacks in a split second. Select any log present in IronWASP and run this module to create a HTML file. When this file is opened from the browser, the browser will send a request similar to the one on which this module was run. It supports requests that have normal body format and also JSON and XML request body formats.

Features

  • Handles GET,POST,XML and JSON Requests.
  • Generates HTML Code to exploit CSRF.
  • Saves a HTML file and provides the location of the file in a text box.

Steps to use

  • Download IronWASP -> http://ironwasp.org/download.html
  • Set IronWASP as proxy.
  • Traverse through the flows to be exploited (using the browser) , so the logs will be captured in IronWASP's Proxy Logs.
  • Right click any log and Goto "Run Modules on this Request/Response" -> Exploitation -> CSRF PoC Generator.
  • It generates the HTML code to exploit CSRF vulnerability and saves it the location specified.
  • Run the file in the browser which has the authenticated session and execute CSRF.

CSRFPOCGenerator Screenshots

CSRFPOCGenerator Screenshot 1

CSRFPOCGenerator Screenshot 2

CSRFPOCGenerator Screenshot 3

CSRFPOCGenerator Screenshot 4

About

Creates a Proof of Concept for CSRF

Resources

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published