Server-Side Request Forgery (SSRF)- PortSwigger Labs

Lab: Basic SSRF against the local server

SSRF Attack Lifecycle

Server-side request forgery (also known as SSRF) is a web security vulnerability that allows an attacker to induce the server-side application to make requests to an unintended location.

In a typical SSRF attack, the attacker might cause the server to make a connection to…

--

--

--

Security Researcher [RED&BLUE]

Love podcasts or audiobooks? Learn on the go with our new app.

Recommended from Medium

Privacy-Enhancing computation will change the future of personal data protection

5G Connectivity with Cyber Caveats

Exploit Development Windows Part — 2

Cmd at BSides Connecticut — PAM for Agile Clouds and Data Center Environments

How to Set Metamask?

Bypassing Web application Firewall — Part 4

Blockchain this Week

{UPDATE} Scrambled Net Hack Free Resources Generator

Get the Medium app

A button that says 'Download on the App Store', and if clicked it will lead you to the iOS App store
A button that says 'Get it on, Google Play', and if clicked it will lead you to the Google Play store
Michael Koczwara

Michael Koczwara

Security Researcher [RED&BLUE]

More from Medium

Server-Side Request Forgery (SSRF)- PortSwigger Labs

Personal CVE-ID Migration Project

Brooklyn 99 CTF - Process and Report

CrowSec EdTech Write-Up: Poisoning