Explore tweets tagged as #Server_Side_Request_Forgery
Server-Side Request Forgery (SSRF) occurs when an attacker tricks a server into making HTTP requests to unintended locations. Here's how to exploit it 👇 #YesWeRHackers #BugBountyTips
1
13
97
XXE → SSRF (Server-Side Request Forgery) 1️⃣ Attacker injects malicious entity: <!ENTITY xxe SYSTEM " http://internal-service.local/admin"> 2️⃣ Parser fetches remote resource. 3️⃣ Attacker pivots into internal network. ➡️ XXE abused to scan, access internal services. #BugBounty
0
32
160
Interested in learning how to hack APIs? Alex's got you in today's video where he walks through two of the most common vulnerabilities that affect APIs: broken authorization and server-side request forgery (SSRF). Watch the full video at the link and get the info you need to
4
26
247
Next.js has become one of the most popular web development frameworks 🤠 But its extensive functionality introduces multiple attack surfaces for security vulnerabilities to arise... 😬 In our latest article, we documented 3 possible ways to exploit server-side request forgery
2
24
140
Just got a reward for a vulnerability submitted on @yeswehack -- Server-Side Request Forgery (SSRF) (CWE-918). #YesWeRHackers
3
1
108
We have observed some interest in https://t.co/XcxCdd8fed CVE-2024-39713 in our sensors. This is a Server-Side Request Forgery (SSRF) vuln which could for example lead to some level of access to internal systems. We added a population scan for exposed IPs (1781 IPs found)
1
12
20
Learning Path: Server-Side Request Forgery (SSRF) SSRF is your gateway to internal systems, cloud metadata, and more. This learning path teaches how to weaponize SSRF and bypass filters with real labs and attacker tools. You’ll learn: 🔶 SSRF against local servers and backend
0
19
85
Coming soon on Code and Stuff: a walkthrough of Server-Side Request Forgery attacks and mitigations, complete with a working webhook demo application! #MyElixirStatus #ApplicationSecurity
1
2
44
Learning path: Server-side request forgery (SSRF) attacks This learning path teaches you about common server-side request forgery (SSRF) techniques used in attacks, their impact, and how to defend against them. You’ll learn: 🔶 The core principles of server-side request
1
7
61
#OWASP_Top_10 #API #Security Risks – 2023 API7:2023 - #Server_Side_Request_Forgery
https://t.co/WCs0BS7p6i
0
0
0
Server-Side Request Forgery (SSRF) Common Example - A vulnerable app fetches file_get_contents($_GET['url']); an attacker inputs http://localhost/admin to read internal pages. #hackers #hacktips #bugbountytips #bugbounty #pentester #burpsuite
0
2
7
SSRF ( server-side request forgery ) via Cloudflare Worker's Edit Page. - I see a possibility to access or communicate to internal services from the instance, let's see if i could work that out ( that could be an escalation in this case )
0
0
20
🚨 ChatGPT Hacked Using Custom GPTs Exploiting SSRF Vulnerability to Expose Secrets Read more: https://t.co/Tj0uoXpHkc A Server-Side Request Forgery (SSRF) vulnerability in OpenAI’s ChatGPT. The flaw, lurking in the Custom GPT “Actions” feature, allowed attackers to trick the
1
59
177
Have you ever exploited SSRF(Server Side Request Forgery) on a target before? A few days ago my good friend and fellow APIsec University ambassador, Jesse Freeman asked if I’d like to help teach people about SSRF vulnerabilities alongside him. I immediately said yes, my first
5
12
48
[OSWE Prep] Today's on SSRF ( Server-Side Request Forgery ) Leading To Internal Port Scanning 🔥 - Wasn't able to access the internal admin service, so i wrote an exploit to enumerate internal ports. The exploit code & vulnerable instance will be uploaded to my GITHUB.
4
5
91
2024 CWE Top 25 Most #Dangerous_Software_Weaknesses: #Server_Side_Request_Forgery #SSRF CWE-918 https://t.co/GEVK92zqSh
0
0
0
We asked @michael_howard which security bug keeps him up at night — and his answer might surprise you. It’s Server-Side Request Forgery (SSRF), a once-obscure web bug that’s now a serious cloud threat every developer should understand. Security Blog: https://t.co/tzpwuOR7NN
1
4
5
🛰️ Understanding SSRF — Server-Side Request Forgery Explained Server-Side Request Forgery (SSRF) is a high-impact vulnerability where an application is tricked into making unauthorized requests on behalf of an attacker. 🔖 #infosec #cybersecurity #SSRFi #OWASP #websecurity
0
0
2
🚨🚨 SysAid PreAuth RCE Chain (CVE-2025-2775, CVE-2025-2776, CVE-2025-2777) Hackers can exploit these vulns to inject malicious XML entities, triggering Server-Side Request Forgery (SSRF) attacks on SysAid Help Desk Software. 🔥PoC: https://t.co/kNyOnjGWC4 ZoomEye
0
7
12
I’ll probably do an impromptu SSRF (Server Side Request Forgery) hacking demo with my buddy Jesse at APISec U tomorrow. To keep it contextual and easy to follow, I added an SSRF vuln to VulnBank so the audience can see exactly how attackers exploit it.
12
13
86