CSRF Overview (2/3)
15/24
CSRF Overview (1/3)
CSRF Overview (3/3)
An attacker can use any number of techniques to trick a trusted user into sending a request unintentionally. This request can potentially perform an unwanted action, bypassing any safeguards that might be in place.