Server Side Request Forgery

  • Unique Paper ID: 149708
  • Volume: 7
  • Issue: 1
  • PageNo: 449-455
  • Abstract:
  • In this paper firstly I introduced the Basic of SSRF Attack and how this attack was worked. Then what are types of SSRF Attack and the impacts of SSRF attack which are basically affected by any web application as well as the mobile applications. And also how the attackers can compromise the server of any application as we know that the server is a very important part of any applications because it stores entire applications data. So we should at least know how the entire process is done that will be covered here. And we know that the security of web application as well as mobile applications is very important nowadays. While SSRF Attack is one of the top most vulnerabilities in web security so the analysis of this attack and how it works,what are the types of SSRF Attacks than common exploitation of these attacks all are very very important points to know.

Copyright & License

Copyright © 2025 Authors retain the copyright of this article. This article is an open access article distributed under the Creative Commons Attribution License which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

BibTeX

@article{149708,
        author = {Singh Shivani and Dr.Ravi Sheth},
        title = {Server Side Request Forgery},
        journal = {International Journal of Innovative Research in Technology},
        year = {},
        volume = {7},
        number = {1},
        pages = {449-455},
        issn = {2349-6002},
        url = {https://ijirt.org/article?manuscript=149708},
        abstract = {In this paper firstly I introduced the Basic of SSRF Attack and how this attack was worked. Then what are types of SSRF Attack and the impacts of SSRF attack which are basically affected by any web application as well as the mobile applications. And also how the attackers can compromise the server of any application as we know that the server is a very important part of any applications because it stores entire applications data. So we should at least know how the entire process is done that will be covered here. And we know that the security of web application as well as mobile applications is very important nowadays. While SSRF Attack is one of the top most vulnerabilities in web security so the analysis of this attack and how it works,what are the types of SSRF Attacks than common exploitation of these attacks all are very very important points to know.},
        keywords = {Port scanning , Blind SSRF, Internal N/W scanning, IP Formatting, Bypass IP whitelisting},
        month = {},
        }

Cite This Article

  • ISSN: 2349-6002
  • Volume: 7
  • Issue: 1
  • PageNo: 449-455

Server Side Request Forgery

Related Articles