1. Home
  2. Training Library
  3. Cross-Site Request Forgery (CSRF)

Cross-Site Request Forgery (CSRF)

Contents

keyboard_tab

The course is part of this learning path

Introduction
Overview
Difficulty
Intermediate
Duration
48m
Description

This course talks about Cross-Site Request Forgery (CSRF) and covers how to install a vulnerable machine called Metasploitable and how to start using it.

Transcript

Hi, within this section, we're going to talk about CSRF which is Cross-Site Request Forgery and we're going to learn a lot. First of all, we're going to install Metasploitable which is another vulnerable machine. Maybe you have worked with this before or maybe you have never heard of it, it doesn't matter I'm going to show you how to install it, how to set it up so that you can start using it. We are going to spend a couple of sections in this vulnerable machine as well then we will move onto another one at later sections. Now, if you're ready, let's get started.

About the Author
Students
198
Courses
55
Learning Paths
3

Atil is an instructor at Bogazici University, where he graduated back in 2010. He is also co-founder of Academy Club, which provides training, and Pera Games, which operates in the mobile gaming industry.