Overview
Explore the intricacies of Server Side Request Forgery (SSRF) attacks on internal networks in this 32-minute conference talk. Delve into ethical hacking through bug bounties and Vulnerability Disclosure Programs (VDPs), uncovering esoteric SSRF entry points and attack examples. Examine the dangers of internal services and learn how to exploit SSRF for both fun and profit. Gain insights into the background of initial research and discover how to exploit OAuth SSRF. Analyze key points of failure for the Department of Defense (DoD) and understand effective SSRF mitigation strategies. Conclude with a Q&A session to address any remaining questions on this critical cybersecurity topic.
Syllabus
Intro
Ethically hacking through Bug bounties and VDP
Esoteric SSRF Entry Points
Esoteric attack examples
Dangers of Internal Services
Exploiting SSRF for Fun and Profit
Background of the initial research
Exploiting the Oauth SSRF for fun
Key points of failure for the DoD
Mitigating SSRF
Questions?
Taught by
Cooper