This talk was recorded at NDC Security in Oslo, Norway. #ndcsecurity #ndcconferences #security #developer #softwaredeveloper
Attend the next NDC conference near you:
Subscribe to our YouTube channel and learn every day: @NDC
Follow our Social Media!
#hacker #owasp #azure
Server-Side Request Forgery (SSRF) is a web application vulnerability where an attacker forces a web server to make a request to a URL of the attackers choosing. SSRFs can be used for instance to bypass access controls, access hidden internal resources or access cloud credentials. These vulnerabilities are nothing new. In fact the term SSRF has been in use for nearly twenty years, and since 2021 SSRF has been a part of the OWASP top 10 list. Even though the bug class has been around "forever", SSRF vulnerabilities still keep turning up, and applications keep failing to properly protect against them.
In this talk we'll start with the most basic example of an SSRF, and then work our way to increasingly more interesting cases. There will be real world examples of bugs found during engagements and in the wild in products like Azure, as well as examples of bypasses of the mitigations made by the vendors.
|
What if your AI could read every legal d...
The legal industry is under pressure. Mo...
AI is reshaping not just what software c...
This talk was recorded at NDC Security i...
This talk was recorded at NDC Security i...
Go Inside the Ropes with host Amanda Bal...
AWS Organizations now supports an upgrad...
To support global operations across mult...
This talk was recorded at NDC Security i...
This talk was recorded at NDC Security i...
This talk was recorded at NDC Security i...
This talk was recorded at NDC Security i...
Meet the Google #Pixel10a, engineered by...