Abusing Reverse Proxies, Part 2: Internal Access
Introduction
As seen in Part 1: Abusing Reverse Proxies: Metadata, open proxies can allow an attacker to access cloud metadata API services. However, even without metadata services available, open proxies can be a boon for an attacker.
A primer on open proxy types:
* Forward: typical use case is allowing private