SSRF without impact is NOT a vulnerability

  Рет қаралды 5,983

LiveUnderflow

LiveUnderflow

Күн бұрын

→ Twitch Subscription: / liveoverflow
→ per Video: / liveoverflow
→ per Month: / @liveoverflow
=[ 📄 Info. ]=
Main Channel: / liveoverflowctf
Twitch: / liveoverflow
=[ 🐕 Social ]=
→ Twitter: / liveoverflow
→ Website: liveoverflow.com/
→ Subreddit: / liveoverflow
→ Facebook: / liveoverflow
=[ 📄 P.S. ]=
#liveoverflow

Пікірлер: 11
@payloadartist
@payloadartist 3 жыл бұрын
Great video mate! Also I thought it might be worth mentioning that the definition of SSRF is a bit misleading on some sources such as Portswigger page, a lot of people refer to it. They use terms such as “inducing the server to make HTTP requests to arbitrary domain of attacker’s choosing“. I don’t quite agree to this the reason being the points you mentioned, attacker should be able to hit internal endpoints or access some part of network which is not reachable outside, say a cloud instance metadata endpoint. Maybe this is why a lot of people confuse this with SSRF.
@maratmkhitaryan9723
@maratmkhitaryan9723 3 жыл бұрын
3:26 actually it is. You can set up a squid proxy, allow only external ip requests. AFAIK many social networks use such proxies which limit the internal network access.
@LiveOverflow
@LiveOverflow 3 жыл бұрын
yeah true, you can do that for your app. My investigation was based on having a CTF challenge with RCE, and thus cannot block that kind of traffic
@Matt0x00
@Matt0x00 3 жыл бұрын
Thank you! I finally have a video to send the "beg bounty" people.
@larszii
@larszii 3 жыл бұрын
Does some have the Github Url with the Metadata Urls?
@tini_
@tini_ 3 жыл бұрын
2:01 you can see it there
@roarene317
@roarene317 3 жыл бұрын
It's actually similar to CVSS but without impact any CIA Triads. It's useless. It should be consider as CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:N which is again 0/10.
@shantanusharma5624
@shantanusharma5624 3 жыл бұрын
Hey @LiveUnderflow, please do a video on how to learn hacking technically.
@shantanusharma5624
@shantanusharma5624 3 жыл бұрын
@KushalThanks for the help but I've already seen this video of him millions of times
@preetiff8187
@preetiff8187 3 жыл бұрын
Love from india ❤️🇮🇳
@xar512
@xar512 3 жыл бұрын
I WAS LOOK ON THIS VULN AND I FOUND YOU MADE VEDIO LOL
How The RIDL CPU Vulnerability Was Found
25:24
LiveOverflow
Рет қаралды 122 М.
Server-Side Request Forgery (SSRF) | Complete Guide
47:04
Rana Khalil
Рет қаралды 75 М.
Une nouvelle voiture pour Noël 🥹
00:28
Nicocapone
Рет қаралды 9 МЛН
UFC 310 : Рахмонов VS Мачадо Гэрри
05:00
Setanta Sports UFC
Рет қаралды 1,2 МЛН
Что-что Мурсдей говорит? 💭 #симбочка #симба #мурсдей
00:19
DEF CON 32 - The Darkest Side of Bug Bounty - Jason Haddix
32:30
DEFCONConference
Рет қаралды 58 М.
Hacking for an Intelligence Agency
13:56
LiveUnderflow
Рет қаралды 29 М.
Server-Side Request Forgery (SSRF) Explained
15:58
NahamSec
Рет қаралды 33 М.
HTTP Desync Attack Explained With Paper
13:00
LiveUnderflow
Рет қаралды 14 М.
"Remove the video as soon as possible"
7:37
LiveUnderflow
Рет қаралды 127 М.
Bug Bounty | $2000 for SSRF bypass using DNS rebinding
12:47
Leet Cipher
Рет қаралды 39 М.
Server Side Request Forgery | Junior Penetration Tester TryHackMe SSRF
20:51
Motasem Hamdan | Cyber Security & Tech
Рет қаралды 27 М.
Hacker Culture Meritocracy?
13:59
LiveOverflow
Рет қаралды 43 М.
Une nouvelle voiture pour Noël 🥹
00:28
Nicocapone
Рет қаралды 9 МЛН