Sept. 27, 2023, 10:36 a.m. | Josh Beck

System Weakness - Medium systemweakness.com

iCSI@NEISD Cybersecurity Classroom

Dear Cybersecurity Educators and Penetration Testing Enthusiasts:

This short CTF activity is designed to illuminate the concept of Server Side Request Forgery (SSRF). In this lab, participants will encounter a web form with a unique twist on IPv4 addressing. While some paths may seem blocked, remember that there’s more than one way to represent an IP address.

Approximate Time to Completion: 5–10 minutes

Key Security+ Exam Concepts: SSRF and the versatile representation of IPv4 …

blocked bypassing concept ctf ctf-writeup cybersecurity forgery hex icsi ipv4 lab may penetration penetration testing protection request server server side ssrf testing web

Azure DevSecOps Cloud Engineer II

@ Prudent Technology | McLean, VA, USA

Security Engineer III - Python, AWS

@ JPMorgan Chase & Co. | Bengaluru, Karnataka, India

SOC Analyst (Threat Hunter)

@ NCS | Singapore, Singapore

Managed Services Information Security Manager

@ NTT DATA | Sydney, Australia

Senior Security Engineer (Remote)

@ Mattermost | United Kingdom

Penetration Tester (Part Time & Remote)

@ TestPros | United States - Remote