Module 14: Server-side Request Forgery
Introduction to SSRF
Interacting with the Vulnerable Server
Interacting with Back-end Systems and Private IP Ranges
Testing for SSRF
Accessing the SSRF Sandbox Application
Discovering SSRF Vulnerabilities




Calling Home to Kali
Exploiting SSRF
Retrieving Data


Instance Metadate in Cloud
Bypassing Authentication in Microservices
Alternative URL Schemes






Extra Mile
Case Study: Group Office
Accessing Group Office
Discovering the SSRF Vulnerabilities

















Exploiting the SSRF Vulnerabilities






Last updated