Server-Side Request Forgery (SSRF)
Identifying SSRF




Enumerating the System

Exploiting SSRF
Accessing Restricted Endpoints

Local File Inclusion (LFI)

The gopher Protocol


Blind SSRF
Identifying Blind SSRF

Exploiting Blind SSRF




Preventing SSRF
Web application
Network layer
Last updated