Server-Side Request Forgery (SSRF) Explained

Поделиться
HTML-код
  • Опубликовано: 23 ноя 2024

Комментарии • 102

  • @francoischaer
    @francoischaer Год назад +41

    hey Ben, we surely already love your content, but, for those like me, who are new to the industry, trying to learn and move forward, we need the technical, very basic content, this will help us understand more in depth how things goes. thank you again for the great content you are delivering, and for the amount of dedication you are putting in

    • @alechernandez5506
      @alechernandez5506 4 месяца назад +2

      When there is an issue or something you understand you should go down the rabbit hole and” master “ it. I’m sure you’re doing well now, this comment was a year ago! But this comment is for people just learning 😁

  • @bashiqali2142
    @bashiqali2142 Год назад +23

    Content + real vulnerability example would be great 🔥

  • @khalidmeister
    @khalidmeister Год назад +9

    Never thought I could learn SSRF in a more comprehensive way by under 15 minutes! Thanks man!

    • @NahamSec
      @NahamSec  Год назад +4

      Thanks! I'm glad it helped!

    • @justice8476
      @justice8476 2 месяца назад

      ​@NahamSec دمت گرم مهندس، ارادت

  • @citywitt3202
    @citywitt3202 Год назад +1

    As CEO of a startup please keep this stuff coming. It took a lot to convince the dev team that exploits weren’t just down to weak passwords so I arranged an in house demo. Jaws dropped. This stuff builds so much awareness. Thank you!

  • @Boondog-hv4wy
    @Boondog-hv4wy 3 месяца назад

    You have helped me a lot as I am stepping into Bug Bounties. I have loved connecting with the people in your discord and have learned so much! I am 1 semester away from getting my bachelor's in computer science and your content as well as the people I found through your community have been invaluable to my success. Thank you so much!

  • @BlancoBox
    @BlancoBox Год назад

    While I may not have commented before, I've been an avid admirer of your work. As an aspiring pentester, I find your technical content to be precisely what I seek. While your other content is commendable, it's ultimately the expertise you bring that I look up to for learning. Your contributions are truly appreciated.

  • @baraamansi7637
    @baraamansi7637 Год назад +1

    OFC it would be truly helpful to see more content like this

  • @sveneFX
    @sveneFX Год назад +1

    Fully in with technical vids, especially when you chain these with Real life vulns you have found 👌

  • @Free.Education786
    @Free.Education786 Год назад +1

    Please, if possible, cover these advanced topics like How to bypass Drupal CMS or other secured CMS? How to bypass HARD WAF protection that stops HTML, SQL, and XSS injection payloads? Payload single-double-triple encoding using Cyber-Chef? How to find the real origin IP of secured websites behind Cloudflare, Akamai, ModSecurity, AWS CDN, etc.,? How to bypass Hard WAF using SQLMAP or Burpsuite? How to find hidden vulnerable parameters and endpoints inside the .js and .jason files? How to find hidden admin pages, cPanel pages, and WHM pages ? Please cover these important topics. Thanks

  • @janekmachnicki2593
    @janekmachnicki2593 Год назад

    Content + real+technical aspect of pen testing and bug hunting .Thanks

  • @JPwnage
    @JPwnage Год назад +3

    Man, keep both coming.!! maybe pick a day to post technical and assign another day for the mentorship aspects or something... Either way ... BOTH ARE EQUALLY IMPORTANT FOR SUCCESS!! ...Also i would love a video on how to transfer from labs /ctf into hacking real world apps. As the fundamentals are the same or close but also very different in alot of ways.

  • @rllan006
    @rllan006 Год назад

    100% both. I like the nuance you teach here. For example login page and SSRF. This is fantastic content.

  • @SanketUppalwar
    @SanketUppalwar 11 месяцев назад

    More content is needed like this along with real life examples that you experienced during bug bounty or other testing application

  • @shiewhun1772
    @shiewhun1772 Год назад

    Yes, this is great. From a web developer perspective. I'm trying to under how my server side applications could be hacked and this is great content. Please, continue.

  • @vaibhavsangwan996
    @vaibhavsangwan996 Год назад +2

    Hey I absolutely love this, I would love to learn from more technical videos like this.

  • @איתיאיתי-צ4ט
    @איתיאיתי-צ4ט Год назад

    Hi man, I would like to hear you how to do bug bounties exactly and maybe if you can show on live all the necessary steps to do it

  • @Weekend-Wire
    @Weekend-Wire Год назад

    I would like to see one of the vulnerabilities you have found and walk through the info gathering stage all the way to the post exploit while explaining the mindset/methodology

  • @GrimComix
    @GrimComix Год назад +2

    Yes, more content like this please 😁

  • @amoh96
    @amoh96 Год назад

    We really want this explain bugs for beginners and give us some advice about the bug i really wish u make playlist for this !! thank u alot

  • @billelghezal7855
    @billelghezal7855 Год назад

    Thank you very much, I hope you'll continue doing these kind of videos 😊

  • @ethyhack
    @ethyhack Год назад

    yes please, give us more content of this kind.

  • @andrewsan2998
    @andrewsan2998 Год назад +3

    East or West, naham is the best.

  • @yourinatestrn3436
    @yourinatestrn3436 Год назад

    Yea would love this type of content plz part 2

  • @RnVjayBZb3V0dWJl
    @RnVjayBZb3V0dWJl Год назад

    Haya!
    I have quite a lot of experience in pentesting webapps, but i do not have any experience in hosting an instance of a webserver, securing it or being able to load an insecure server, but in a secure way cause we don't want a creepy scanner rooting it and being malicious when i want to test it :P
    So my question, could you make a lill tutorial in how to, for example, use a docker or maybe host a site in different means through a Digital Ocean instance? :P
    Would be fun to learn a little bit about it and then being able to pentest towards it. By learning this, one can use your knowledge to host a file hosting instance to make an RFI etc, which is a bit difficult without an outwards facing host ^^
    Stay safe and happy late Easter!

  • @supritpandurangi5647
    @supritpandurangi5647 Год назад +1

    Waiting for this type of content ; please Continue Ben :)

  • @tabysh_s5016
    @tabysh_s5016 Год назад

    Ben One Suggestio | Make a precise playlist of OWASP TOP 10 2021 | Like a 10 min video / on each critical vulnerability

  • @ss-rc1gy
    @ss-rc1gy Год назад

    fantastic :o , i would like to see a full and advanced recon video from you :)

  • @volatileobj3cts
    @volatileobj3cts Год назад

    Super down with more technical content!

  • @long2330
    @long2330 Год назад

    Thanks for helpful content! It would be great if u could do more specific showcases about blind SSRF. For example there is a case that I only receive the DNS queries back to the collab. I guess because of outbound restriction but it seems like the server was trying to reach to that domain. Any way in this case that you can prove the ssrf is there with just DNS? Or do you have any suggestion on setting up things in internal network to prove the vulnerability is there?
    Was a long comment but hope u could imagine the case 😂 thanks

  • @andrewlentz1205
    @andrewlentz1205 Год назад

    I think you should pivot to doing Unboxing Videos. If that's not in the cards then please keep the technical videos coming!

  • @BulbulBigbossbd
    @BulbulBigbossbd Год назад

    Hi NahamSec, I'm a regular viewer of your content.can you make video on business logic in dept!! waiting for it

  • @samadafridi1059
    @samadafridi1059 8 месяцев назад

    part 2 or complete playlist on the web Vuln

  • @gokul5582
    @gokul5582 Год назад

    What to do if we don't have burp collaboraor ?

  • @augustvansickle1
    @augustvansickle1 Год назад

    Would love to see more technical content! TIA

  • @stevejones371
    @stevejones371 Год назад

    More, more more real world how to once we have done recon. We need to know the steps on how to find bugs.

  • @djrozh5438
    @djrozh5438 Год назад

    Creat a playlist content like the types of vulnerabilities and bugs that are common or rate easy to hard like xss or account takover

  • @lovedaysmart9183
    @lovedaysmart9183 Год назад

    Just what we need Ben 😊 thank you 👏🏻

  • @heli_9
    @heli_9 Год назад

    I’d love more technical videos

  • @firosiam7786
    @firosiam7786 Год назад

    Is Bola and idor the same type of vulnerability with different names

  • @tehlan6340
    @tehlan6340 Год назад +2

    You are great bro

  • @jeremyg737
    @jeremyg737 Год назад

    part 2? more content like this!

  • @ogbooker4538
    @ogbooker4538 Год назад

    both content is fine and some free tutorials

  • @NexInfernis
    @NexInfernis Год назад

    we need more part of this

  • @ogbooker4538
    @ogbooker4538 Год назад

    stay consistent big bro

  • @zak6820
    @zak6820 Год назад

    Yes more content like this pls

  • @AdarshThakur-Official
    @AdarshThakur-Official 3 месяца назад

    Please create similar content to this and please add Hindi subtitles for a better understanding

  • @LulzWalker
    @LulzWalker Год назад

    Love this!

  • @tchalla109
    @tchalla109 Год назад

    Drop video with all of the topic you mentioned in the video.

  • @AnonymousWolf-r6d
    @AnonymousWolf-r6d 9 месяцев назад

    more vcontent like this cover all top 10 owasp vulnerability please...

  • @rafekhen4263
    @rafekhen4263 7 месяцев назад

    more content like this please

  • @onsiyammalembe1546
    @onsiyammalembe1546 Год назад

    I love this content make more please

  • @devanshuthanvi731
    @devanshuthanvi731 Год назад

    Perfect type of content 😃👍

  • @Tergaurav
    @Tergaurav Год назад

    Vulnerability content or owasp top 10 pls

  • @twoyastara-t3t
    @twoyastara-t3t Год назад

    Preach!

  • @SecurityVaultYt
    @SecurityVaultYt Год назад

    Epic, Part 2 please.

  • @bugs-lk3jf
    @bugs-lk3jf Год назад

    Great Content; More Please 🤑

  • @TrecXsec
    @TrecXsec Год назад

    More part 2. Need more technical vids

  • @raghvendrachouhan3433
    @raghvendrachouhan3433 Год назад

    theory is all good but when it comes to practical i'm hopeless.

  • @fadelafanmahendra653
    @fadelafanmahendra653 Год назад

    more content like THIS!

  • @imosolar
    @imosolar Год назад

    More real bugbouty tech work

  • @husamgameel1489
    @husamgameel1489 Год назад

    yup yup more tutorials for hacking and IT stuff how to do ore bypass

  • @dtchallohfranc3360
    @dtchallohfranc3360 Год назад

    Part 2 please
    😍

  • @Arian-e7t
    @Arian-e7t Год назад

    I would like to see basic contents like this.

  • @SunilTiwari-ez9lj
    @SunilTiwari-ez9lj Год назад

    More parts on this topic ..

  • @suryaroja03
    @suryaroja03 Год назад

    please post content like this...thank you

  • @mahdihasan42
    @mahdihasan42 Год назад

    we need location traking tutorial

  • @Drakan1990
    @Drakan1990 11 месяцев назад

    More please!

  • @CYBER_BLUE4
    @CYBER_BLUE4 5 месяцев назад +1

    Part two

  • @soulvideos7834
    @soulvideos7834 Год назад

    More content like this 🙂🙏❤️🔥

  • @noureldinehab2686
    @noureldinehab2686 Год назад

    💙

  • @Aashishsec
    @Aashishsec Год назад +1

    more content on web attacks

  • @loneliestwolf4228
    @loneliestwolf4228 Год назад

    Part 2 please....

  • @Asadneon
    @Asadneon 9 месяцев назад

    web hacking content more please

  • @akeelw084
    @akeelw084 7 месяцев назад

    part 7 we want

  • @CookingCooking77
    @CookingCooking77 7 месяцев назад

    MORE CONTENT !!!

  • @alihussainzada3392
    @alihussainzada3392 Год назад

    It was awesome
    Next xxe plz

  • @NathanielMitchellnm
    @NathanielMitchellnm Год назад

    Part 2!

  • @braaemad2745
    @braaemad2745 Год назад

    more and more plz

  • @taqiuddinismail9542
    @taqiuddinismail9542 Год назад

    more content like thiss

  • @bashiqali2142
    @bashiqali2142 Год назад

    😊

  • @weniweedeewiki.6237
    @weniweedeewiki.6237 Год назад

    PART 2 BRO DEFO

  • @mindf4rt
    @mindf4rt Год назад

    More pls =)

  • @ZarakKhanNiazi
    @ZarakKhanNiazi Год назад

    I love you naham

  • @aavezsheikh5781
    @aavezsheikh5781 Год назад

    More content

  • @srcybersec1736
    @srcybersec1736 Год назад

    Want more vdo

  • @0xbeven462
    @0xbeven462 Год назад

    I reported my browser 😂

  • @Jarling-so4oi
    @Jarling-so4oi 2 месяца назад +1

    Make more technical content

  • @entertainment_in_blood
    @entertainment_in_blood Год назад

    PART-2

  • @SalimShaikh-ip7gi
    @SalimShaikh-ip7gi Год назад

    Part2

  • @MUHAMMADHASNAATARSHAD
    @MUHAMMADHASNAATARSHAD Год назад

    Part 2 ,,4,5,6,7,8,9,-----,99999

  • @yourmove9993
    @yourmove9993 Год назад

    part 2

  • @mahdihasan42
    @mahdihasan42 Год назад

    location hack

  • @Haxr-dq6wt
    @Haxr-dq6wt Год назад

    Bad explanation with a lot or wrong info

  • @tehlan6340
    @tehlan6340 Год назад

    I make hacking videos

  • @handle_my_handle
    @handle_my_handle Год назад

    Part 2

  • @navidof5
    @navidof5 Год назад

    part 2

  • @JD-wj1bf
    @JD-wj1bf Год назад

    Part 2