
Abusing Reverse Proxies, Part 2: Internal Access
Introduction As seen in Part 1: Abusing Reverse Proxies: Metadata [https://blog.projectdiscovery.io/abusing-reverse-proxies-metadata/], open proxies can allow an attacker to access cloud metadata API services. However, even without metadata services available, open proxies can be a boon for an attacker....