⚠️ CSRF Attack Warning: This page contains hidden forms that will submit malicious requests!
If you're logged into the banking site, a $500 transfer may be executed.
🎯 POST-based CSRF Attack Status
Attack Type: Hidden Form Auto-Submit
Target Amount: $500
Method: POST request with form data
Status: Preparing attack...
🔍 How POST-based CSRF Works:
- User visits malicious page (this contest page)
- Hidden forms are automatically submitted via JavaScript
- POST request sent to banking site with malicious data
- Browser includes cookies automatically with the request
- Banking server processes the POST as legitimate
- Action executed without user consent (money transfer)
⚔️ Attack Variations:
- 🎯 Auto-submit on page load - Immediate attack
- 🎯 Submit on user interaction - Triggered by clicks
- 🎯 Multiple forms - Several attacks at once
- 🎯 Iframe submission - Hidden in invisible frame
🛡️ Why This Attack Works:
- ❌ No CSRF token validation
- ❌ No origin header checking
- ❌ Automatic cookie inclusion
- ❌ Same-origin policy doesn't block form submissions
Processing your contest entry...
Educational Note: This demonstrates how attractive websites can hide malicious forms
Always verify that contest/prize websites are legitimate before entering personal information!
Check your banking application to see if the CSRF attack succeeded