Главная
Study mode:
on
1
Intro
2
Ethically hacking through Bug bounties and VDP
3
Esoteric SSRF Entry Points
4
Esoteric attack examples
5
Dangers of Internal Services
6
Exploiting SSRF for Fun and Profit
7
Background of the initial research
8
Exploiting the Oauth SSRF for fun
9
Key points of failure for the DoD
10
Mitigating SSRF
11
Questions?
Description:
Explore the intricacies of Server Side Request Forgery (SSRF) attacks on internal networks in this 32-minute conference talk. Delve into ethical hacking through bug bounties and Vulnerability Disclosure Programs (VDPs), uncovering esoteric SSRF entry points and attack examples. Examine the dangers of internal services and learn how to exploit SSRF for both fun and profit. Gain insights into the background of initial research and discover how to exploit OAuth SSRF. Analyze key points of failure for the Department of Defense (DoD) and understand effective SSRF mitigation strategies. Conclude with a Q&A session to address any remaining questions on this critical cybersecurity topic.

Piercing the Veil - Server Side Request Forgery Attacks on Internal Networks

Cooper
Add to list