Geek Culture
Published in

Geek Culture

SSRF Vulnerability From a Developer’s Perspective

Photo by Irvan Smith on Unsplash

Introduction

OWASP Top 10 provides users a list of vulnerabilities in the field of application security. This list is prepared based on the severity of the occurrence of an attack, SSRF is one of them. SSRF attacks mostly have a high severity as with this attack an attacker can fetch a lot of details from the server such as the version of the protocol that is being used, and can…

--

--

--

A new tech publication by Start it up (https://medium.com/swlh).

Recommended from Medium

4 critical things SMEs should look out for in SaaS terms of service (ToS)

Confusion Between Cyber & Crime Insurance Puts Businesses at Risk

Tips to Prevent Businesses From Cyber Attacks

LDAP Injection: From a Developer’s Perspective

{UPDATE} 究極戰神 IF706-M Hack Free Resources Generator

Uber For Hit Men, Kidnappers, and Child Molesters Is Coming. Buckle Up!

🐶 DAF — Decentralized Autonomous Foundation 🐶

Zenlink tutorial — next generation of DEX on polkadot

Get the Medium app

A button that says 'Download on the App Store', and if clicked it will lead you to the iOS App store
A button that says 'Get it on, Google Play', and if clicked it will lead you to the Google Play store
Gupta Bless

Gupta Bless

Security enthusiast working to secure web for others.

More from Medium

File Upload Vulnerabilities: From a Developer’s Perspective

Vulnhub: XSS AND MYSQL FILE (Walkthrough)

[Offensive security] How toconduct server-side request forgery (SSRF)

SQL Injection - The File Upload Playground