I\'m doing an introduction to the web security to some other people in our enterprise, and I want to show some example to have more impact.
For this I\'ve created a
On the "other host" (the attacker) you just create a FORM
with method POST
whose action
(i.e. where the form is submitted) is your vulnerable app. Then you submit it with javascript on that page.
Like this:
This will submit a POST
to your vulnerable app from the attacker's host, when you open that page.