<?xml version="1.0" encoding="UTF-8"?>
<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:dc="http://purl.org/dc/elements/1.1/">
  <channel>
    <title>DEV Community: sanjanashetty16</title>
    <description>The latest articles on DEV Community by sanjanashetty16 (@sanjanashetty16).</description>
    <link>https://dev.to/sanjanashetty16</link>
    <image>
      <url>https://media2.dev.to/dynamic/image/width=90,height=90,fit=cover,gravity=auto,format=auto/https:%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Fuser%2Fprofile_image%2F503829%2F2e54295d-fdf5-4694-bc84-c8e763ce1947.jpg</url>
      <title>DEV Community: sanjanashetty16</title>
      <link>https://dev.to/sanjanashetty16</link>
    </image>
    <atom:link rel="self" type="application/rss+xml" href="https://dev.to/feed/sanjanashetty16"/>
    <language>en</language>
    <item>
      <title>Server Side Request Forgery Attack</title>
      <dc:creator>sanjanashetty16</dc:creator>
      <pubDate>Thu, 17 Dec 2020 11:28:06 +0000</pubDate>
      <link>https://dev.to/sanjanashetty16/server-side-request-forgery-attack-50ho</link>
      <guid>https://dev.to/sanjanashetty16/server-side-request-forgery-attack-50ho</guid>
      <description>&lt;p&gt;&lt;strong&gt;What is a Server Side Request Forgery attack?&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;Server-Side Request Forgery, also known as SSRF refers to an attack that lets an attacker send crafted requests from the back-end server of a vulnerable web application.&lt;br&gt;
SSRF is commonly used by attackers to target internal networks that are behind firewalls and can not be reached from the external network.&lt;/p&gt;

&lt;p&gt;If the user-supplied URL is processed and the back-end response is not sanitized then the attack can lead to several impacts.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;How is an SSRF Vulnerability Exploited?&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;There are 2 ways by which an SSRF vulnerability is usually exploited:&lt;/p&gt;

&lt;ol&gt;
&lt;li&gt;&lt;p&gt;Trying to access or load sensitive content from the server. This test is for local and remote file inclusion.&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;Trying to access a trust relationship that often emerges when the application server connects with back-end systems that have private IP addresses that are not routable and mostly limited to public users.&lt;/p&gt;&lt;/li&gt;
&lt;/ol&gt;

&lt;p&gt;&lt;em&gt;A more detailed version along with the impact and how you can prevent the SSRF attack is published at &lt;a href="https://beaglesecurity.com/blog/article/server-side-request-forgery-attack.html"&gt;https://beaglesecurity.com/blog/article/server-side-request-forgery-attack.html&lt;/a&gt;&lt;/em&gt;&lt;/p&gt;

</description>
      <category>security</category>
      <category>testing</category>
      <category>wordpress</category>
      <category>webdev</category>
    </item>
    <item>
      <title>Docker Container Security: Attacking Docker Vulnerabilities</title>
      <dc:creator>sanjanashetty16</dc:creator>
      <pubDate>Sun, 01 Nov 2020 16:57:43 +0000</pubDate>
      <link>https://dev.to/sanjanashetty16/docker-container-security-attacking-docker-vulnerabilities-4f9h</link>
      <guid>https://dev.to/sanjanashetty16/docker-container-security-attacking-docker-vulnerabilities-4f9h</guid>
      <description>&lt;p&gt;Docker is one of the most widely used container-based technologies. It is a tool that helps to create, deploy, and run applications by using containers.&lt;/p&gt;

&lt;p&gt;Containers make it easy for the developers to build the application with all its dependencies and libraries and ship it out as one package. But with new technologies come new vulnerabilities.&lt;/p&gt;

&lt;p&gt;Below are the few attacks related to docker, its vulnerabilities, and mitigations explained. &lt;/p&gt;

&lt;ol&gt;
&lt;li&gt;Privilege Escalation in a host using docker&lt;/li&gt;
&lt;li&gt;Dangling volumes&lt;/li&gt;
&lt;li&gt;Exploiting Docker Private Registry&lt;/li&gt;
&lt;li&gt;Accessing Docker Secrets In Environment Variables&lt;/li&gt;
&lt;li&gt;Exploiting Docker Daemon API&lt;/li&gt;
&lt;li&gt;Container Escape Using Privileged Flag&lt;/li&gt;
&lt;/ol&gt;

&lt;p&gt;A more detailed version along with how you can avoid these vulnerabilities is published at &lt;a href="https://beaglesecurity.com/blog/article/docker-container-security.html"&gt;https://beaglesecurity.com/blog/article/docker-container-security.html&lt;/a&gt;&lt;/p&gt;

</description>
      <category>docker</category>
      <category>informationsecurity</category>
      <category>dockervulnerabilites</category>
    </item>
  </channel>
</rss>
