[Owasp-leaders] CSRF

Eoin eoin.keary at owasp.org
Wed May 29 20:41:30 UTC 2013


That's not CSRF strictly speaking. There is no session or forgery. But rather turning victims into bots.

Eoin Keary
Owasp Global Board
+353 87 977 2988


On 29 May 2013, at 15:52, Christian Papathanasiou <christian.papathanasiou at owasp.org> wrote:

> Absolutely!
> 
> Sent from my iPhone
> 
> On 29 May 2013, at 15:39, gaz Heyes <gazheyes at gmail.com> wrote:
> 
>> Account DOS would work too since you could send a valid username with an incorrect password from lots of IP addresses which might cause an account lockout.
>> 
>> 
>> On 29 May 2013 15:29, Christian Papathanasiou <christian.papathanasiou at owasp.org> wrote:
>>> Another scenario is:
>>> 
>>> Distributed client side login/pass bruteforce :-)
>>> 
>>> Once victims connect to attacker controlled server they are dished out hundreds of CSRF vectors such ass
>>> 
>>> <img src=http://server/login?username=&user1pass=pass1>
>>> 
>>> Username password pairs
>>> 
>>> With each subsequent CSRF vector sent  testing for a post authentication function
>>> 
>>> Once word list subset exhausted page updates with next set to try
>>> 
>>> In essence achieving distributed non attributable brute force (and potentially knock on effects of application layer DoS)
>>> 
>>> All theoretically possible I think but have never seen that really done in the wild have any of you? Perhaps something BeEF does in the XSS world?
>>> 
>>> Christian
>>> 
>>> On 29 May 2013, at 14:46, Giorgio Fedon <giorgio.fedon at owasp.org> wrote:
>>> 
>>> > Another scenario is when you need to poison DNS cache. In that case you
>>> > may need many resolution request from a lot of different ips. And maybe
>>> > the function that force the dns resolution is in the authenticated area
>>> >
>>> >
>>> > On 05/29/2013 03:19 PM, gaz Heyes wrote:
>>> >> On 29 May 2013 14:14, Giorgio Fedon <giorgio.fedon at owasp.org
>>> >> <mailto:giorgio.fedon at owasp.org>> wrote:
>>> >>
>>> >>    Incrimination is something that may happen by forcing a user doing
>>> >>    something illegal.
>>> >>
>>> >>
>>> >> That isn't what I meant. You can assign the IP address of the user to
>>> >> a specific account that has already performed or about to perform
>>> >> illegal activity.
>>> >
>>> >
>>> > --
>>> > | Giorgio Fedon, Owasp Italy
>>> > |
>>> > | In Input Validation
>>> > |            and Output Sanitization,
>>> > |                                   We Trust
>>> > --
>>> > | Web: https://www.owasp.org/index.php/Italy
>>> > |_____________________________________________.
>>> >
>>> > _______________________________________________
>>> > OWASP-Leaders mailing list
>>> > OWASP-Leaders at lists.owasp.org
>>> > https://lists.owasp.org/mailman/listinfo/owasp-leaders
> _______________________________________________
> OWASP-Leaders mailing list
> OWASP-Leaders at lists.owasp.org
> https://lists.owasp.org/mailman/listinfo/owasp-leaders
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://lists.owasp.org/pipermail/owasp-leaders/attachments/20130529/feb5fd4b/attachment.html>


More information about the OWASP-Leaders mailing list