Test Login Scenario with CSRF field
See original GitHub issueHow can i do test login scenario with csrf field in it ? like laravel or ci…
This is so far the code that i wrote
config:
target: "http://aimsis-exam.dev"
phases:
-
duration: 10
arrivalRate: 200
payload:
path: "user.csv"
fields:
- "username"
- "password"
scenarios:
-
name: "Access Page with Autoplay Music"
flow:
-
get:
url: "/test"
-
name: "Access Exam Web"
flow:
-
post:
url: "/login"
body: "user={{ username }}&pass={{ password }}"
Issue Analytics
- State:
- Created 7 years ago
- Comments:6 (1 by maintainers)
Top Results From Across the Web
How to test for Cross-Site Request Forgery? - Bright Security
Learn what cross-site request forgery testing is and how to test for CSRF vulnerabilities in your applications.
Read more >Case Study: JMeter Load Testing User Login with CSRF ...
How to create a simple load test in JMeter. This article will walk through a simple login load test scenario with JMeter.
Read more >Cross-site Request Forgery in Login Form - Invicti
In a login CSRF attack, the attacker forges a login request to an honest site using the attacker's user name and password at...
Read more >Testing for Cross Site Request Forgery - OWASP Foundation
Cross-Site Request Forgery (CSRF) is an attack that forces an end user to execute unintended actions on a web application in which they...
Read more >Login CSRF - Knowledge Base - Detectify
Login CSRF is a type of attack where the attacker can force the user to log in to the attacker's account on a...
Read more >Top Related Medium Post
No results found
Top Related StackOverflow Question
No results found
Troubleshoot Live Code
Lightrun enables developers to add logs, metrics and snapshots to live code - no restarts or redeploys required.
Start FreeTop Related Reddit Thread
No results found
Top Related Hackernoon Post
No results found
Top Related Tweet
No results found
Top Related Dev.to Post
No results found
Top Related Hashnode Post
No results found
Top GitHub Comments
@hassy link is broken Where can we find modern docs?
I think the latest link for @hassy comment is https://artillery.io/docs/http-reference/#extracting-and-reusing-parts-of-a-response-request-chaining