Copyright © 2025 Authors retain the copyright of this article. This article is an open access article distributed under the Creative Commons Attribution License which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.
@article{149708, author = {Singh Shivani and Dr.Ravi Sheth}, title = {Server Side Request Forgery}, journal = {International Journal of Innovative Research in Technology}, year = {}, volume = {7}, number = {1}, pages = {449-455}, issn = {2349-6002}, url = {https://ijirt.org/article?manuscript=149708}, abstract = {In this paper firstly I introduced the Basic of SSRF Attack and how this attack was worked. Then what are types of SSRF Attack and the impacts of SSRF attack which are basically affected by any web application as well as the mobile applications. And also how the attackers can compromise the server of any application as we know that the server is a very important part of any applications because it stores entire applications data. So we should at least know how the entire process is done that will be covered here. And we know that the security of web application as well as mobile applications is very important nowadays. While SSRF Attack is one of the top most vulnerabilities in web security so the analysis of this attack and how it works,what are the types of SSRF Attacks than common exploitation of these attacks all are very very important points to know.}, keywords = {Port scanning , Blind SSRF, Internal N/W scanning, IP Formatting, Bypass IP whitelisting}, month = {}, }
Submit your research paper and those of your network (friends, colleagues, or peers) through your IPN account, and receive 800 INR for each paper that gets published.
Join NowNational Conference on Sustainable Engineering and Management - 2024 Last Date: 15th March 2024
Submit inquiry