Owning the Cloud Through SSRF

Owning the Cloud Through SSRF

44CON Information Security Conference via YouTube Direct link

WeasyPrint Makes Hacking (W)easy

13 of 19

13 of 19

WeasyPrint Makes Hacking (W)easy

Class Central Classrooms beta

YouTube videos curated by Class Central.

Classroom Contents

Owning the Cloud Through SSRF

Automatically move to the next video in the Classroom when playback concludes

  1. 1 Intro
  2. 2 WHO ARE WE
  3. 3 SSRF According to OWASP
  4. 4 What is Cloud Metadata?
  5. 5 Basic Example
  6. 6 CVE Examples
  7. 7 SSRF Hurdles
  8. 8 Headless Browsers
  9. 9 HTML Renderers
  10. 10 Simple XSS- SSRF via wkhtmltopdf
  11. 11 When Simple Fails
  12. 12 XSS via escaping tag
  13. 13 WeasyPrint Makes Hacking (W)easy
  14. 14 Use The Source
  15. 15 Attachments
  16. 16 DNS Rebinding for Fun and Profit
  17. 17 HTTPRebind
  18. 18 Recap
  19. 19 Keep in Touch

Never Stop Learning.

Get personalized course recommendations, track subjects and courses with reminders, and more.

Someone learning on their laptop while sitting on the floor.