This project is a Capture The Flag (CTF) challenge focused on Cross-Site Request Forgery (CSRF) vulnerabilities. It is designed to help users understand and practice exploiting CSRF vulnerabilities in a controlled environment.
- Simulated web application with CSRF vulnerabilities.
- Multiple challenge levels to test your skills.
- Detailed hints and explanations for learning purposes.
- Docker (latest version)
- Docker Compose (latest version)
- Node.js (v18 or higher)
- npm or yarn
- A modern web browser
-
Clone the repository:
git clone https://github.com/codewizardSumit/web-security-csrf-demo.git cd web-security-csrf-demo -
Build and run the application using Docker Compose:
docker-compose up --build
-
Open your browser and navigate to
http://localhost:4000.
- Explore the web application and identify CSRF vulnerabilities.
- Complete the challenges by crafting malicious requests.
- Learn from the provided hints and explanations.
This project is for educational purposes only. Do not use the knowledge gained from this project for malicious purposes.
This project is licensed under the MIT License.
Contributions are welcome! Please open an issue or submit a pull request.
For questions or feedback, please contact At: vidyanshugautam01@gmail.com .