Chris Sullo

2 posts
Abusing Reverse Proxies, Part 2: Internal Access
by Chris Sullo — 5 min read

Abusing Reverse Proxies, Part 2: Internal Access

Introduction As seen in Part 1: Abusing Reverse Proxies: Metadata [https://blog.projectdiscovery.io/abusing-reverse-proxies-metadata/], open proxies can allow an attacker to access cloud metadata API services. However, even without metadata services available, open proxies can be a boon for an attacker....

You’ve successfully subscribed to ProjectDiscovery.io | Blog
Welcome back! You’ve successfully signed in.
Great! You’ve successfully signed up.
Your link has expired
Success! Check your email for magic link to sign-in.
Please enter at least 3 characters 0 Results for your search