An attacker can take advantage of legitimate cross-site requests and turn them into a malicious exploit. In this video, you’ll learn about cross-site request forgeries and server-side request forgeries.
<< Previous Video: Replay Attacks Next: Driver Manipulation >>