2021 OWASP Top Ten: Server Side Request Forgery

Поделиться
HTML-код
  • Опубликовано: 23 ноя 2024

Комментарии • 16

  • @alexanderbradshaw5626
    @alexanderbradshaw5626 2 года назад +3

    Great video series! Straight to the point by explaining the topic, giving an example, and how to prevent it.

    • @devcentral
      @devcentral  2 года назад

      Glad you liked them and we appreciate the nice comment!

  • @haciemredasgin2323
    @haciemredasgin2323 2 года назад +2

    Thanks for all the videos!

    • @devcentral
      @devcentral  2 года назад +1

      Glad you liked them and we appreciate the comments!!

  • @eishantandon7639
    @eishantandon7639 2 года назад +1

    Hey John... I would just like to comment "Awesome".
    Jokes apart.... They are really great videos... I Have been through all the videos of OWASP Top 10 and they are really informational and most importantly... all are in layman terms which makes it quite understandable for the noob like us in the fields of Cybersecurity.

    • @devcentral
      @devcentral  2 года назад

      Thanks and we really appreciate the comment! Glad you enjoyed the series!!

  • @EasyPickens999
    @EasyPickens999 2 года назад +5

    Another great video; it gives a good idea of the concept of SSRF and some ideas for mitigating risks. However, I think that the example is a bit contrived; it would be a great example for the insecure design video. The app should not expect a URL for the stock API, it should expect a product ID then obtain the stock API URL from its own data store.

  • @ReuvenKaplan
    @ReuvenKaplan Год назад

    In what real world scenario would an api accept the url it should fetch? And if it did, isn’t that just another form of injection?

  • @anandhutraj7109
    @anandhutraj7109 2 года назад +1

    Thanks for the video series😇

    • @devcentral
      @devcentral  2 года назад

      You are welcome, glad you enjoyed it and thanks for the comment!!

  • @niektolen
    @niektolen 2 года назад +1

    Great speaker

    • @devcentral
      @devcentral  2 года назад

      Thanks! We appreciate the comment!

  • @tabysh_s5016
    @tabysh_s5016 Год назад

    At first, i thought he is quoting definitions on his own, but subsequently, I found he was actually paraphrasing OWASP's documentaion! So Bad

  • @Charlie-ho6sn
    @Charlie-ho6sn Год назад +1

    Definitely stockAPI passed from a user is not a real world example

  • @ReuvenKaplan
    @ReuvenKaplan Год назад +2

    In what real world scenario would an api accept the url it should fetch? And if it did, isn’t that just another form of injection?