This document discusses server-side request forgery (SSRF) attacks and their history. SSRF attacks allow an attacker to exploit vulnerabilities in web applications to initiate requests from the server to other internal or external systems. The document outlines the basics of SSRF attacks and categorizes different types, providing examples of how SSRF can be used in proxy and connect-back attacks. It emphasizes the risk of SSRF attacks against critical enterprise applications given the sensitive data they contain.
Related topics: