The application has an Anti-CSRF token implemented
Removing the Anti-CSRF Token
Altering the Anti-CSRF Token
Using the Attacker’s Anti-CSRF Token
Spoofing the Anti-CSRF Token
Using guessable Anti-CSRF Tokens
Stealing Anti-CSRF Tokens
Last updated 2 years ago