Server-Side Request Forgery (SSRF) | Demo
ฝัง
- เผยแพร่เมื่อ 15 ต.ค. 2021
- Have you ever wondered how to run commands through a remote system? Join Daniel as he shows you how SSRF allows you to run commands, such as reading files or seeing other users' information, through a remote system. If you are interested in ethical hacking and penetration testing check out CompTIA PenTest+ on ITProTv.
Looking to get into cybersecurity? Start learning today with ITProTV: go.itpro.tv/security-skills
Connect with Daniel Lowrie:
LinkedIn: / daniellowrie
Blog: blog.itpro.tv/
#ssrfvulnerability #serversiderequestforgery #ssrfethicalhacking
Absolute gold so many make this out to be more complicated than it actually is.
Simple demo. Easy understanding.
Love these simple and quick presentations, cheers Daniel!
Glad you like them!
Excellent demo!
wow.... this is how a concept should be explained... great job... subscribed ur channel
Simple and to point 👍
great video! thank you
Very nice!
Thanks for sharing it
Great explaination thank you :)
Loved It!!!!!!!!!
Thanks daniel and ITProTv . This is a wonderful explanation. I have a question baffling me. The first thing we do is collect information and then search for a vulnerability. Is this a feasible way to search for a vulnerability in the deep web?
amazing!
Great stuff as always thank-yiou Daniel
how is this not a lfi? local file inclusion? im new
2:27 How exactly is the server side taking the variable reserved for language selection and trying to make a web request with it lol?
you are my inspiration thanks daneil you are my sensie
Dutch