Course Content

Course Content

FAQs

An attacker uses server functionality to access or modify resources in a Server-Side Request Forgery (SSRF) attack. The attacker goes after an application that allows users to import data from URLs or read data from URLs.

Whitelisting the hostname (DNS name) or IP address that your application needs to access is the most reliable approach to eliminate server-side request forgery (SSRF). If you can't utilise a whitelist and must rely on a blacklist, it's critical to properly validate user input.

The target application may have the ability to import data from a URL, publish data to a URL, or read data from a URL that has been tampered with. The attacker alters the calls to this feature by using a different URL or changing the way URLs are constructed (path traversal etc.).

The user is the target of a CSRF attack. While it was successful in exploiting holes in the website's design, the goal was to perform legitimate but unauthorised operations on the user's web-based service account. SSRF, on the other hand, is primarily designed to attack the server.

Server side request forgery is a type of attack that exploits the trust relationship between the browser and the server. The attacker submits a form to the server, but instead of submitting it to the intended destination, they submit it to another website.

Recommended Courses

Share With Friend

Have a friend to whom you would want to share this course?

Download LearnVern App

App Preview Image
App QR Code Image
Code Scan or Download the app
Google Play Store
Apple App Store
598K+ Downloads
App Download Section Circle 1
4.57 Avg. Ratings
App Download Section Circle 2
15K+ Reviews
App Download Section Circle 3
  • Learn anywhere on the go
  • Get regular updates about your enrolled or new courses
  • Share content with your friends
  • Evaluate your progress through practice tests
  • No internet connection needed
  • Enroll for the webinar and join at the time of the webinar from anywhere