Completed
How is it working?
Class Central Classrooms beta
YouTube videos curated by Class Central.
Classroom Contents
SSRF vs Business Critical Applications
Automatically move to the next video in the Classroom when playback concludes
- 1 Intro
- 2 2 ERP Scan
- 3 Enterprise applications: Definitions
- 4 Business-critical systems architecture
- 5 Secure corporate network
- 6 Corporate network attack scenario
- 7 SSRF History: Basics
- 8 SSRF history: World research
- 9 Trusted SSRF: Oracle Database
- 10 SSRF Types: SAP
- 11 Remote SSRF: Subtypes
- 12 Simple Remote SSRF: Login bruteforce
- 13 XXE Attacks on other services
- 14 Full Remote SSRF
- 15 Remote SSRF threats
- 16 XXE Tunneling to Verb Tampering
- 17 XXE Tunneling to Buffer Overflow (Hint 2)
- 18 XXE Tunneling to Buffer Overflow: Packet B
- 19 XXE Tunneling to Buffer Overflow (Hint 3)
- 20 XXE Tunneling to Rsh
- 21 Bypass SAP security restrictions
- 22 SAP Gateway server security bypass: Exploit
- 23 SAP Message Server security bypass
- 24 Oracle DB security bypass
- 25 Conclusion?
- 26 Purpose
- 27 How is it working?
- 28 Few steps
- 29 Action: Test
- 30 Action: Scan
- 31 Action: Attack
- 32 DEMO