Server-Side Request Forgery (SSRF)- PortSwigger Labs

Lab: SSRF with filter bypass via open redirection vulnerability

SSRF Attack Lifecycle

Lab: SSRF with filter bypass via open redirection vulnerability

Objectives:

This lab has a stock check feature that fetches data from an internal system.

--

--

--

Security Researcher [RED&BLUE]

Love podcasts or audiobooks? Learn on the go with our new app.

Recommended from Medium

Cloud Security: What’s Trending Now?

Gta Slot Machine Odds

Machine

Understanding privacy and security at Invitae

Corelan — Tutorial 7 — Exercise Solution

Upfire and the Revolution of File Sharing

One of the quickest rewards

Cyber Crime and Confusion Matrix

Enter the Dragon: the CCPA and What it Means for You

Get the Medium app

A button that says 'Download on the App Store', and if clicked it will lead you to the iOS App store
A button that says 'Get it on, Google Play', and if clicked it will lead you to the Google Play store
Michael Koczwara

Michael Koczwara

Security Researcher [RED&BLUE]

More from Medium

Server-Side Request Forgery (SSRF)- PortSwigger Labs

The Fastjson “Auto Type Bypass” leads to RCE vulnerability — CVE-2022–25845

Container breakout: CAP_SYS_ADMIN via Creating a cgroup and using unshare utility

What is Automated Content Discovery?