An attacker uses server functionality to access or modify resources in a Server-Side Request Forgery (SSRF) attack. The attacker goes after an application that allows users to import data from URLs or read data from URLs.
Whitelisting the hostname (DNS name) or IP address that your application needs to access is the most reliable approach to eliminate server-side request forgery (SSRF). If you can't utilise a whitelist and must rely on a blacklist, it's critical to properly validate user input.
The target application may have the ability to import data from a URL, publish data to a URL, or read data from a URL that has been tampered with. The attacker alters the calls to this feature by using a different URL or changing the way URLs are constructed (path traversal etc.).
The user is the target of a CSRF attack. While it was successful in exploiting holes in the website's design, the goal was to perform legitimate but unauthorised operations on the user's web-based service account. SSRF, on the other hand, is primarily designed to attack the server.
Server side request forgery is a type of attack that exploits the trust relationship between the browser and the server. The attacker submits a form to the server, but instead of submitting it to the intended destination, they submit it to another website.
Learner's Ratings
4.6
Overall Rating
82%
6%
4%
1%
7%
Reviews
M
Md Tanjimul Islam Sifat
5
I think learn vern is the best free learning online platform.😊🥰🥰
S
shivansh sharma
5
NICE
B
Boss
5
best
H
Huraira mughal
5
Very much informative thanks 👍
N
Nishant Vhora
5
dear sir apne kali linux me jo do terminal chalu kiaye the usme scann kar ne ke liye rakha tha vo apne dikha ya hi nahi
V
VIKAS
5
Sir , your lectures are so amazing , easy to learn and super easy to understand . Thank you so much sir
sir please check the chapter Anonymous Browsing and Stegeganography video number 1 and 2 r same
A
AAQIB SHAIKH
5
SIR plz tell me is the GOOGLE CLOUD CONSOLE completely free
R
Raaz
5
best course
A
Akshay M
4
everything is good but they should provide class notes in form of ppt or pdf
S
Shivam
5
couse is very best
Show More
Recommended Courses
Cyber Forensics Masterclass with Hands on learning
Share a personalized message with your friends.