Summary
In this chapter, we looked at different ways to discover and exploit CSRF vulnerabilities. When testing for websites, always look around to test anti-CSRF tokens and their implementation—most of the time some endpoint or another misses proper checks and so on.
In the next chapter, we'll take a look at different ways to exploit SQL injection vulnerabilities. We are mainly going to cover the popular and robust exploitation tool SQLMap.