This talk was recorded at NDC Security in Oslo, Norway. #ndcsecurity #ndcconferences #security #developer #softwaredeveloper
Attend the next NDC conference near you:
Subscribe to our YouTube channel and learn every day: @NDC
Follow our Social Media!
#hacker #owasp #azure
Server-Side Request Forgery (SSRF) is a web application vulnerability where an attacker forces a web server to make a request to a URL of the attackers choosing. SSRFs can be used for instance to bypass access controls, access hidden internal resources or access cloud credentials. These vulnerabilities are nothing new. In fact the term SSRF has been in use for nearly twenty years, and since 2021 SSRF has been a part of the OWASP top 10 list. Even though the bug class has been around "forever", SSRF vulnerabilities still keep turning up, and applications keep failing to properly protect against them.
In this talk we'll start with the most basic example of an SSRF, and then work our way to increasingly more interesting cases. There will be real world examples of bugs found during engagements and in the wild in products like Azure, as well as examples of bypasses of the mitigations made by the vendors.
|
This talk was recorded at NDC Security i...
This talk was recorded at NDC Security i...
This talk was recorded at NDC Security i...
Beyond Trust: Building Community-Driven ...
This talk was recorded at NDC Security i...
← View the Full Syllabus and Reserve Yo...
Improve your web development skills by b...
Learn the basics of LLMs in 60 seconds w...
本日はAIを0から学ぶステップについてお話させて頂きました! ぜひご視聴ください...
モンスターハンターワイルズは多くのユーザからのアクセスを見込んだクロスプラットフ...
PointFive is a Cloud and AI Efficiency E...
Go Inside the Ropes with host Amanda Bal...
🔥PGP in Generative AI and ML in collabor...
This video walks you through enabling mu...