Lab 29


Lab Hint

First, create an HTTP request that uses the GET method to exploit the cross-site request forgery vulnerability in the Voting page. Change the HTTP GET request to an HTTP POST request and resubmit the request that attempts cross-site request forgery

Videos


YouTubeMutillidae: Lab 29 Walkthrough