Server-Side Request Forgery (SSRF)Hard
SSRF allows attackers to induce the server to make requests to unintended locations.
Educational Purpose Only
SSRF allows attackers to induce the server to make requests to unintended locations.
Common Tools:
- SSRFmap
- Gopherus
- SSRF Proxy
Web applications, databases, authentication systems
Ranked in the OWASP Top 10 Web Application Security Risks
Insecure Deserialization occurs when untrusted data is used to abuse the logic of an application, inflict a denial of service (DoS) attack, or even execute arbitrary code.
XSS attacks inject malicious scripts into web pages viewed by other users.
Race conditions occur when the behavior of a system depends on the sequence or timing of uncontrollable events, potentially leading to unexpected results.
XXE attacks exploit vulnerable XML processors to read sensitive files or perform server-side request forgery.