{"id":4638,"date":"2017-08-17T18:31:19","date_gmt":"2017-08-17T10:31:19","guid":{"rendered":"https:\/\/www.darknet.org.uk\/?p=4638"},"modified":"2017-10-03T19:26:47","modified_gmt":"2017-10-03T11:26:47","slug":"need-know-server-side-request-forgery-ssrf","status":"publish","type":"post","link":"https:\/\/www.darknet.org.uk\/2017\/08\/need-know-server-side-request-forgery-ssrf\/","title":{"rendered":"What You Need To Know About Server Side Request Forgery (SSRF)"},"content":{"rendered":"

SSRF or Server Side Request Forgery is an attack vector that has been around for a long time, but do you actually know what it is?<\/p>\n

Server Side Request Forgery (SSRF) refers to an attack where in an attacker is able to send a crafted request from a vulnerable web application. SSRF is usually used to target internal systems behind firewalls that are normally inaccessible to an attacker from the external network.<\/p><\/blockquote>\n

\"What<\/p>\n

Typically Server Side Request Forgery (SSRF) occurs when a web application is making a request, where an attacker has full or partial control of the request that is being sent. A common example is when an attacker can control all or part of the URL to which the web application makes a request to some third-party service.<\/p><\/blockquote>\n

There are various things you can use SSRF for such as:<\/p>\n