We use cookies and other technologies on this website to enhance your user experience.
By clicking any link on this page you are giving your consent to our Privacy Policy and Cookies Policy.

关于SSRF (Web)

可能能够从未直接暴露在互联网上的服务中读取数据

The target application may have functionality for importing data from a URL, publishing data to a URL or otherwise reading data from a URL that can be tampered with. The attacker modifies the calls to this functionality by supplying a completely different URL or by manipulating how URLs are built (path traversal etc.).

When the manipulated request goes to the server, the server-side code picks up the manipulated URL and tries to read data to the manipulated URL. By selecting target URLs the attacker may be able to read data from services that are not directly exposed on the internet

最新版本1.0.0更新日志

Last updated on 2021年07月22日

Minor bug fixes and improvements. Install or update to the newest version to check it out!

翻译中...

更多应用信息

最新版本

请求 SSRF (Web) 更新 1.0.0

系统要求

6.0 and up

更多

SSRF (Web) 屏幕截图

订阅APKPure
第一时间获取热门安卓游戏应用的首发体验,最新资讯和玩法教程。
不,谢谢
订阅
订阅成功!
您已订阅APKPure。
订阅APKPure
第一时间获取热门安卓游戏应用的首发体验,最新资讯和玩法教程。
不,谢谢
订阅
成功!
您已订阅我们的邮件通知。