JMETER + POST + anti-forgery token

JMETER + POST + anti-forgery token

Looking into XSRF/CSRF Prevention in ASP.NET MVC and Web Pages it appears that you're either sending an incorrect __RequestVerificationToken parameter value or completely miss the step.

If the current HTTP request already contains an anti-XSRF session token (the anti-XSRF cookie __RequestVerificationToken), the security token is extracted from it. If the HTTP request does not contain an anti-XSRF session token or if extraction of the security token fails, a new random anti-XSRF token will be generated.

So your test should look like:

  • Open Login Page (HTTP Get Request)

  • Once done you can refer the extracted value as ${token} in the next request

     

     

Check out ASP.NET Login Testing with JMeter article for more detailed information and step-by-step instructions if needed

 

作者:Chuck Lu    GitHub    
posted @   ChuckLu  阅读(461)  评论(0编辑  收藏  举报
编辑推荐:
· 记一次.NET内存居高不下排查解决与启示
· 探究高空视频全景AR技术的实现原理
· 理解Rust引用及其生命周期标识(上)
· 浏览器原生「磁吸」效果!Anchor Positioning 锚点定位神器解析
· 没有源码,如何修改代码逻辑?
阅读排行:
· 全程不用写代码,我用AI程序员写了一个飞机大战
· DeepSeek 开源周回顾「GitHub 热点速览」
· MongoDB 8.0这个新功能碉堡了,比商业数据库还牛
· 记一次.NET内存居高不下排查解决与启示
· 白话解读 Dapr 1.15:你的「微服务管家」又秀新绝活了
历史上的今天:
2018-10-31 Could not load file or assembly 'MyAssembly.XmlSerializers
2017-10-31 如何编译dotnet core
2014-10-31 第7章 调试和错误处理 7.1.1 VS中的调试
2014-10-31 markdown的语法说明
2014-10-31 在Github上搭建博客
点击右上角即可分享
微信分享提示