Anuj Singh Chauhananujcybersec.hashnode.dev·Dec 23, 2023Advent of Cyber 2023 — Day 22 WriteupLearning Objectives Understanding server-side request forgery (SSRF) Which different types of SSRF are used to exploit the vulnerability Prerequisites for exploiting the vulnerability How the attack works How to exploit the vulnerability Mitiga...tryhackmeAdd a thoughtful commentNo comments yetBe the first to start the conversation.