|
- What is SSRF (Server-side request forgery)? Tutorial Examples | Web . . .
In an SSRF attack against the server, the attacker causes the application to make an HTTP request back to the server that is hosting the application, via its loopback network interface
- Blind SSRF vulnerabilities | Web Security Academy - PortSwigger
In this section, we'll explain what blind server-side request forgery is, describe some common blind SSRF examples, and explain how to find and exploit blind SSRF vulnerabilities
- Server-side request forgery (SSRF) attacks - PortSwigger
This learning path teaches you about server-side request forgery (SSRF) You'll learn about its impact, common techniques used in attacks, and how to defend against them
- Lab: Basic SSRF against the local server - PortSwigger
Server Side Request Forgery - SSRF What is it? How does it work? Basic SSRF against local server - YouTube
- How to identify and exploit HTTP Host header vulnerabilities
Classic SSRF vulnerabilities are usually based on XXE or exploitable business logic that sends HTTP requests to a URL derived from user-controllable input Routing-based SSRF, on the other hand, relies on exploiting the intermediary components that are prevalent in many cloud-based architectures
- Login - PortSwigger
PortSwigger offers tools for web application security, testing scanning Choose from a wide range of security tools identify the very latest vulnerabilities
- XSS vs CSRF | Web Security Academy - PortSwigger
XSS vs CSRF In this section, we'll explain the differences between XSS and CSRF, and discuss whether CSRF tokens can help to prevent XSS attacks What is the difference between XSS and CSRF? Cross-site scripting (or XSS) allows an attacker to execute arbitrary JavaScript within the browser of a victim user Cross-site request forgery (or CSRF) allows an attacker to induce a victim user to
- Testing for SSRF with Burp Suite - PortSwigger
Server-side request forgery (SSRF) is a web security vulnerability that allows an attacker to induce the server-side application to make requests to an unintended location SSRF vulnerabilities may enable you to communicate with back-end systems that are not normally publicly available via a compromised server
|
|
|