Penetration Testing - Server Side Request Forgery (SSRF)

preview_player
Показать описание
Penetration Testing - Server Side Request Forgery (SSRF)
Lecture By: Mr. Sharad Kumar, Tutorials Point India Private Limited
Рекомендации по теме
Комментарии
Автор

Use coupon ""YOUTUBE12"" to get “FLAT 12%’’ OFF at Checkout.

TutorialsPoint_
Автор

I had no idea what you wanted to show with that port number man. seriously.

PiduguSundeep
Автор

6 mins in etc he gets XSPA completely wrong. You need to put the url as local host:22 etc not try to scan ports on other sites its a way of making this server access ports only available internally or on other connected machines that are not probable

benjaminmcewan
Автор

Why had they removed their great apps from play store 😭😭😭😭?

parbatimukherjee
Автор

can't understand anything he says

addobado
Автор

You didn't cover Server side request Forgery fully. The way to prevent it is to blacklist 127.0.0.1 and encoded IP eg unicode encoded and also blacklist local host

That prevents such an attack. You have partial knowledge and make simple mistakes. Nice vulnerable application. Have a look at OWASP references for accurate free info

benjaminmcewan