Category:OWASP CSRFTester Project
Just when developers are starting to run in circles over Cross Site Scripting, the 'sleeping giant' awakes for yet another web-catastrophe. Cross-Site Request Forgery (CSRF) is an attack whereby the victim is tricked into loading information from or submitting information to a web application for which they are currently authenticated. The problem is that the web application has no means of verifying the integrity of the request. The OWASP CSRFTester Project attempts to give developers the ability to test their applications for CSRF flaws.
You can access the source code at: http://owaspcsrftester.googlecode.com/
Click here to download the latest OWASP CSRFTester 1.0 binary and startup script.
Click here to download the latest OWASP CSRFTester 1.0 source and binary.
Click here to download the author's presentation at the 2007 OWASP conference in San Jose about the dangers of CSRF and a brief description of both CSRF Guard and CSRF Tester.
Click here for documentation regarding the use of the CSRFTester.
Click here to view the road map for the latest development version of CSRFGuard. Please feel free to add your own change requests or send me patches/diffs!
Feedback and Participation
We hope you find CSRFTester useful. Please contribute back to the project by sending your comments, questions, and suggestions to OWASP. Thanks!
Check out the OWASP CSRF Guard project page for a number of CSRF defense mechanisms written in different languages.
Please see the OWASP CSRF Prevention Cheat Sheet for more information on prevention.
The Open Web Application Security Project is purely an open-source community driven effort. As such, all projects and research efforts are contributed and maintained with an individual's spare time. If you have found this or any other project useful, please support OWASP with a donation.
This category currently contains no pages or media.