Server-Side Request Forgery (SSRF) | Demo

Поделиться
HTML-код
  • Опубликовано: 23 ноя 2024

Комментарии • 19

  • @AnthonyMcqueen1987
    @AnthonyMcqueen1987 2 года назад +7

    Absolute gold so many make this out to be more complicated than it actually is.

  • @环球体育游览
    @环球体育游览 Год назад

    Simple demo. Easy understanding.

  • @tomsgrinbergs8020
    @tomsgrinbergs8020 3 года назад +5

    Love these simple and quick presentations, cheers Daniel!

  • @Rajuthinnaluri
    @Rajuthinnaluri Год назад

    wow.... this is how a concept should be explained... great job... subscribed ur channel

  • @ultrastoat3298
    @ultrastoat3298 Год назад +2

    2:27 How exactly is the server side taking the variable reserved for language selection and trying to make a web request with it lol?

  • @cptvasilyzaytsev9245
    @cptvasilyzaytsev9245 11 месяцев назад

    Excellent demo!

  • @meowcat220
    @meowcat220 3 года назад +1

    Thanks daniel and ITProTv . This is a wonderful explanation. I have a question baffling me. The first thing we do is collect information and then search for a vulnerability. Is this a feasible way to search for a vulnerability in the deep web?

  • @justfair4181
    @justfair4181 Год назад

    Very nice!
    Thanks for sharing it

  • @Longboardingdude3956
    @Longboardingdude3956 Год назад +2

    how is this not a lfi? local file inclusion? im new

  • @dragongamer2774
    @dragongamer2774 Год назад +1

    Loved It!!!!!!!!!

  • @Alijuraiz
    @Alijuraiz Год назад

    Simple and to point 👍

  • @januglaison2217
    @januglaison2217 2 года назад +1

    great video! thank you

  • @farbod-3267
    @farbod-3267 Год назад +1

    amazing!

  • @zermax
    @zermax Год назад

    Great explaination thank you :)

  • @waynesrealworld5801
    @waynesrealworld5801 2 года назад +1

    Great stuff as always thank-yiou Daniel

  • @Lithium-z4z
    @Lithium-z4z Год назад

    you are my inspiration thanks daneil you are my sensie

  • @devproco8063
    @devproco8063 Год назад

    Dutch