JMETER + POST + anti-forgery token

JMETER + POST + anti-forgery token

Looking into XSRF/CSRF Prevention in ASP.NET MVC and Web Pages it appears that you're either sending an incorrect __RequestVerificationToken parameter value or completely miss the step.

If the current HTTP request already contains an anti-XSRF session token (the anti-XSRF cookie __RequestVerificationToken), the security token is extracted from it. If the HTTP request does not contain an anti-XSRF session token or if extraction of the security token fails, a new random anti-XSRF token will be generated.

So your test should look like:

  • Open Login Page (HTTP Get Request)

  • Once done you can refer the extracted value as ${token} in the next request

     

     

Check out ASP.NET Login Testing with JMeter article for more detailed information and step-by-step instructions if needed

 

posted @ 2019-10-31 10:21  ChuckLu  阅读(451)  评论(0编辑  收藏  举报