SlideShare a Scribd company logo
2
Most read
3
Most read
4
Most read
Web Attacks
Vulnerabilities
SSRF
1
2
Server-Side Request Forgery (SSRF)
SSRF
Server Side Request Forgery (SSRF) refers to an attack where in an attacker is able to send a crafted request
from a vulnerable web application. SSRF is usually used to target internal systems behind firewalls that are
normally inaccessible to an attacker from the external network.
Typically Server Side Request Forgery (SSRF) occurs when a web application is making a request, where an
attacker has full or partial control of the request that is being sent. A common example is when an attacker can
control all or part of the URL to which the web application makes a request to some third-party service.
3
CSRF – Attack Explanation
Attack explanation
• The Firewall allows all users use HTTP service.
• The Firewall blocks SSH request.
• The attacker use HTTP service from Web Server to gain SSH Access at the internal network. (Via HTTP
the Firewall doesn’t block the request.
4
SSRF Prevention
Protection
To prevent SSRF vulnerabilities in your web applications it is strongly advised to use a whitelist of allowed domains
and protocols from where the web server can fetch remote resources.
Also, as a rule of thumb you should avoid using user input directly in functions that can make requests on behalf of
the server. You should also sanitize and filter user input, but it is typically very hard to implement mainly because it is
virtually impossible to cover all the different scenarios.

More Related Content

PDF
SSRF workshop
PPTX
SSRF exploit the trust relationship
PPTX
PPTX
Vulnerabilities in modern web applications
PPTX
Understanding Cross-site Request Forgery
PPT
Introduction to Web Application Penetration Testing
PDF
Api security-testing
PPTX
Xss attack
SSRF workshop
SSRF exploit the trust relationship
Vulnerabilities in modern web applications
Understanding Cross-site Request Forgery
Introduction to Web Application Penetration Testing
Api security-testing
Xss attack

What's hot (20)

PPTX
Cross Site Request Forgery (CSRF) Scripting Explained
PPTX
SSRF For Bug Bounties
PPTX
Directory Traversal & File Inclusion Attacks
PPTX
Cross Site Scripting ( XSS)
PPTX
Command injection
PPT
Cross Site Request Forgery
PPTX
Getting Started with API Security Testing
PPTX
Sql injections - with example
PPTX
A2 - broken authentication and session management(OWASP thailand chapter Apri...
PDF
OWASP Top 10 Vulnerabilities - A5-Broken Access Control; A6-Security Misconfi...
PDF
OWASP Top 10 Web Application Vulnerabilities
PPTX
SQL Injections - A Powerpoint Presentation
PDF
HTTP Security Headers
PPTX
PPTX
Web application security
PPTX
Introduction to path traversal attack
PPT
Top 10 Web Security Vulnerabilities (OWASP Top 10)
PPT
SQL Injection
PPTX
Attacking thru HTTP Host header
Cross Site Request Forgery (CSRF) Scripting Explained
SSRF For Bug Bounties
Directory Traversal & File Inclusion Attacks
Cross Site Scripting ( XSS)
Command injection
Cross Site Request Forgery
Getting Started with API Security Testing
Sql injections - with example
A2 - broken authentication and session management(OWASP thailand chapter Apri...
OWASP Top 10 Vulnerabilities - A5-Broken Access Control; A6-Security Misconfi...
OWASP Top 10 Web Application Vulnerabilities
SQL Injections - A Powerpoint Presentation
HTTP Security Headers
Web application security
Introduction to path traversal attack
Top 10 Web Security Vulnerabilities (OWASP Top 10)
SQL Injection
Attacking thru HTTP Host header
Ad

Similar to Ssrf (20)

PDF
Talking About SSRF,CRLF
PPTX
A8 cross site request forgery (csrf) it 6873 presentation
PDF
Preventing Web-Proxy Based DDoS using Request Sequence Frequency
PDF
K017135461
PDF
Report on xss and do s
PPTX
TYPES OF CYBER ATTACKS.pptx
PDF
What are the Denial of Service attacks and what are possible approac.pdf
PPTX
Types of attack
PDF
Enhancing the impregnability of linux servers
PDF
ENHANCING THE IMPREGNABILITY OF LINUX SERVERS
PDF
50063
PDF
ECE560 Denial of Service Attacks Fall2020.pdf
PPT
web _security_ for _confedindality s.ppt
PPTX
Cyber Security Acronyms Glossary.pptx
PDF
Protecting Global Records Sharing with Identity Based Access Control List
PDF
Different Types of Attacks and Detection Techniques in Mobile Ad Hoc Network
PDF
DDoS-bdNOG
PDF
Prevention Against CSRF Attack using Client Server Mutual Authentication Tech...
PDF
Aw36294299
PDF
A ROBUST MECHANISM FOR DEFENDING DISTRIBUTED DENIAL OF SERVICE ATTACKS ON WEB...
Talking About SSRF,CRLF
A8 cross site request forgery (csrf) it 6873 presentation
Preventing Web-Proxy Based DDoS using Request Sequence Frequency
K017135461
Report on xss and do s
TYPES OF CYBER ATTACKS.pptx
What are the Denial of Service attacks and what are possible approac.pdf
Types of attack
Enhancing the impregnability of linux servers
ENHANCING THE IMPREGNABILITY OF LINUX SERVERS
50063
ECE560 Denial of Service Attacks Fall2020.pdf
web _security_ for _confedindality s.ppt
Cyber Security Acronyms Glossary.pptx
Protecting Global Records Sharing with Identity Based Access Control List
Different Types of Attacks and Detection Techniques in Mobile Ad Hoc Network
DDoS-bdNOG
Prevention Against CSRF Attack using Client Server Mutual Authentication Tech...
Aw36294299
A ROBUST MECHANISM FOR DEFENDING DISTRIBUTED DENIAL OF SERVICE ATTACKS ON WEB...
Ad

More from Ilan Mindel (12)

PPTX
PPTX
PPTX
Sql injection
PPTX
Lfi rfi
PPTX
Creds extraction
PPTX
Tunneling
PPTX
Reverse shell
PPTX
Responder
PPTX
Ports and services
PPTX
Password cracking
PPTX
Formula injection/DDE/Macro
PPTX
Responder PPT
Sql injection
Lfi rfi
Creds extraction
Tunneling
Reverse shell
Responder
Ports and services
Password cracking
Formula injection/DDE/Macro
Responder PPT

Recently uploaded (20)

PPTX
Funds Management Learning Material for Beg
PDF
Vigrab.top – Online Tool for Downloading and Converting Social Media Videos a...
PPTX
Introuction about WHO-FIC in ICD-10.pptx
PDF
Tenda Login Guide: Access Your Router in 5 Easy Steps
PPTX
522797556-Unit-2-Temperature-measurement-1-1.pptx
PPTX
innovation process that make everything different.pptx
PPTX
SAP Ariba Sourcing PPT for learning material
PPTX
Slides PPTX World Game (s) Eco Economic Epochs.pptx
PDF
RPKI Status Update, presented by Makito Lay at IDNOG 10
PPTX
Introduction about ICD -10 and ICD11 on 5.8.25.pptx
PPTX
CHE NAA, , b,mn,mblblblbljb jb jlb ,j , ,C PPT.pptx
PDF
Cloud-Scale Log Monitoring _ Datadog.pdf
PPT
tcp ip networks nd ip layering assotred slides
PDF
APNIC Update, presented at PHNOG 2025 by Shane Hermoso
PPTX
international classification of diseases ICD-10 review PPT.pptx
PPTX
June-4-Sermon-Powerpoint.pptx USE THIS FOR YOUR MOTIVATION
PDF
The New Creative Director: How AI Tools for Social Media Content Creation Are...
PPTX
Digital Literacy And Online Safety on internet
PPTX
introduction about ICD -10 & ICD-11 ppt.pptx
PDF
Unit-1 introduction to cyber security discuss about how to secure a system
Funds Management Learning Material for Beg
Vigrab.top – Online Tool for Downloading and Converting Social Media Videos a...
Introuction about WHO-FIC in ICD-10.pptx
Tenda Login Guide: Access Your Router in 5 Easy Steps
522797556-Unit-2-Temperature-measurement-1-1.pptx
innovation process that make everything different.pptx
SAP Ariba Sourcing PPT for learning material
Slides PPTX World Game (s) Eco Economic Epochs.pptx
RPKI Status Update, presented by Makito Lay at IDNOG 10
Introduction about ICD -10 and ICD11 on 5.8.25.pptx
CHE NAA, , b,mn,mblblblbljb jb jlb ,j , ,C PPT.pptx
Cloud-Scale Log Monitoring _ Datadog.pdf
tcp ip networks nd ip layering assotred slides
APNIC Update, presented at PHNOG 2025 by Shane Hermoso
international classification of diseases ICD-10 review PPT.pptx
June-4-Sermon-Powerpoint.pptx USE THIS FOR YOUR MOTIVATION
The New Creative Director: How AI Tools for Social Media Content Creation Are...
Digital Literacy And Online Safety on internet
introduction about ICD -10 & ICD-11 ppt.pptx
Unit-1 introduction to cyber security discuss about how to secure a system

Ssrf

  • 2. 2 Server-Side Request Forgery (SSRF) SSRF Server Side Request Forgery (SSRF) refers to an attack where in an attacker is able to send a crafted request from a vulnerable web application. SSRF is usually used to target internal systems behind firewalls that are normally inaccessible to an attacker from the external network. Typically Server Side Request Forgery (SSRF) occurs when a web application is making a request, where an attacker has full or partial control of the request that is being sent. A common example is when an attacker can control all or part of the URL to which the web application makes a request to some third-party service.
  • 3. 3 CSRF – Attack Explanation Attack explanation • The Firewall allows all users use HTTP service. • The Firewall blocks SSH request. • The attacker use HTTP service from Web Server to gain SSH Access at the internal network. (Via HTTP the Firewall doesn’t block the request.
  • 4. 4 SSRF Prevention Protection To prevent SSRF vulnerabilities in your web applications it is strongly advised to use a whitelist of allowed domains and protocols from where the web server can fetch remote resources. Also, as a rule of thumb you should avoid using user input directly in functions that can make requests on behalf of the server. You should also sanitize and filter user input, but it is typically very hard to implement mainly because it is virtually impossible to cover all the different scenarios.