SlideShare a Scribd company logo
5
Most read
Talk on SSRF and CRLF Injection.
By Mohit Vohra
(Security Engineer at Tac Security)
Quick overview:-
● What is penetration testing?
● What is web penetration testing?
What is CRLF Injection?
● CRLF Injection Vulnerability is a web application vulnerability
happens due to direct parsing of user entered data to the response
header fields like set cookie without proper sanitation.
● CR and LF are special characters (%0a%0d).
● It is one of the injection attacks, it can be used to escalate more
malicious attacks like xss.
Talking About SSRF,CRLF
Talking About SSRF,CRLF
Mitigations of CRLF:-
● Always follow the rule of never trust user input.
● Sanitize and neutralize all user-supplied data or properly encode
output in HTTP headers that would otherwise be visible to users
in order to prevent the injection of crlf.
What is SSRF?
Server-side request forgery is a web security vulnerability that
allows an attacker to induce the server-side application to make
HTTP requests to an arbitrary domain of attacker’s choosing.
SSRF attacks often exploit trust relationships to escalate an
attack from the vulnerable application and perform
unauthorized actions. These relationships might exist in relation
to server itself, or in relation to other back-end systems within
the same organization.
Let’s live demonstrate it..
Mitigations of SSRF:-
● A blacklist is not a good protection because with so many different
protocols, schemes, encodings, bypasses will most certainly occur.
Because of this, a whitelist is a better approach.
● Proper input validation of data can majorly help the client to protect
the web application against unwanted controls or actions.
Talking About SSRF,CRLF

More Related Content

PPTX
PDF
Web Application Penetration Testing
PPTX
WAF Bypass Techniques - Using HTTP Standard and Web Servers’ Behaviour
PPTX
PPTX
SSRF For Bug Bounties
PPTX
Secure coding practices
PPTX
Metasploit framework in Network Security
PPTX
Cross-Site Scripting (XSS)
Web Application Penetration Testing
WAF Bypass Techniques - Using HTTP Standard and Web Servers’ Behaviour
SSRF For Bug Bounties
Secure coding practices
Metasploit framework in Network Security
Cross-Site Scripting (XSS)

What's hot (20)

PPTX
Web application security
PPTX
Metasploit
PPTX
Web Application Security 101
PDF
SSRF workshop
PDF
CSRF, ClickJacking & Open Redirect
PPTX
Tools for Open Source Intelligence (OSINT)
PDF
Penetration testing web application web application (in) security
PDF
OWASP Top 10 Web Application Vulnerabilities
PDF
HTTP Request Smuggling via higher HTTP versions
PPTX
Pentesting ReST API
PDF
Sigma Hall of Fame - EU ATT&CK User Workshop, October 2021
PPT
Secure code practices
PDF
Building Advanced XSS Vectors
PPT
Penetration Testing Basics
DOCX
Vulnerability Assessment and Penetration Testing Framework by Falgun Rathod
PPTX
Waf bypassing Techniques
PPTX
VAPT PRESENTATION full.pptx
PPTX
Sql injections - with example
PPTX
Reconnaissance - For pentesting and user awareness
PDF
Ransomware attacks
Web application security
Metasploit
Web Application Security 101
SSRF workshop
CSRF, ClickJacking & Open Redirect
Tools for Open Source Intelligence (OSINT)
Penetration testing web application web application (in) security
OWASP Top 10 Web Application Vulnerabilities
HTTP Request Smuggling via higher HTTP versions
Pentesting ReST API
Sigma Hall of Fame - EU ATT&CK User Workshop, October 2021
Secure code practices
Building Advanced XSS Vectors
Penetration Testing Basics
Vulnerability Assessment and Penetration Testing Framework by Falgun Rathod
Waf bypassing Techniques
VAPT PRESENTATION full.pptx
Sql injections - with example
Reconnaissance - For pentesting and user awareness
Ransomware attacks
Ad

Similar to Talking About SSRF,CRLF (20)

PPTX
SSRF exploit the trust relationship
PDF
Prevention Against CSRF Attack using Client Server Mutual Authentication Tech...
PPTX
Cyber security 2.pptx
PDF
Csrf
PPTX
Understanding Cross-site Request Forgery
PPTX
Its all about CSRF - null Mumbai Meet 10 January 2015 Null/OWASP Chapter
PDF
SSRF vs. Business-critical applications. Part 2. New vectors and connect-back...
PPTX
SOHIL_RM (1).pptx
PPTX
A8 cross site request forgery (csrf) it 6873 presentation
PPTX
Security Issues in HTML 5
PDF
Understanding CSRF
PDF
SSRF vs. Business-critical applications. XXE tunneling in SAP
PPTX
Exploring Web Security Threats: A Practical Study on SQL Injection and CSRF
PPTX
Client sidesec 2013 - non js
PPTX
Cross Site Request Forgery- CSRF
PDF
Oh no, was that CSRF #Ouch
PDF
A4 A K S H A Y B H A R D W A J
PDF
Make CSRF Again
PPT
Cross Site Request Forgery Vulnerabilities
PDF
CSRF Attacks and its Defence using Middleware
SSRF exploit the trust relationship
Prevention Against CSRF Attack using Client Server Mutual Authentication Tech...
Cyber security 2.pptx
Csrf
Understanding Cross-site Request Forgery
Its all about CSRF - null Mumbai Meet 10 January 2015 Null/OWASP Chapter
SSRF vs. Business-critical applications. Part 2. New vectors and connect-back...
SOHIL_RM (1).pptx
A8 cross site request forgery (csrf) it 6873 presentation
Security Issues in HTML 5
Understanding CSRF
SSRF vs. Business-critical applications. XXE tunneling in SAP
Exploring Web Security Threats: A Practical Study on SQL Injection and CSRF
Client sidesec 2013 - non js
Cross Site Request Forgery- CSRF
Oh no, was that CSRF #Ouch
A4 A K S H A Y B H A R D W A J
Make CSRF Again
Cross Site Request Forgery Vulnerabilities
CSRF Attacks and its Defence using Middleware
Ad

More from n|u - The Open Security Community (20)

PDF
Hardware security testing 101 (Null - Delhi Chapter)
PDF
PDF
Api security-testing
PDF
Introduction to TLS 1.3
PDF
Gibson 101 -quick_introduction_to_hacking_mainframes_in_2020_null_infosec_gir...
PPTX
Building active directory lab for red teaming
PPTX
Owning a company through their logs
PPTX
Introduction to shodan
PDF
Detecting persistence in windows
PPTX
Frida - Objection Tool Usage
PDF
OSQuery - Monitoring System Process
PDF
DevSecOps Jenkins Pipeline -Security
PDF
Extensible markup language attacks
PPTX
PDF
PDF
News bytes null 200314121904
Hardware security testing 101 (Null - Delhi Chapter)
Api security-testing
Introduction to TLS 1.3
Gibson 101 -quick_introduction_to_hacking_mainframes_in_2020_null_infosec_gir...
Building active directory lab for red teaming
Owning a company through their logs
Introduction to shodan
Detecting persistence in windows
Frida - Objection Tool Usage
OSQuery - Monitoring System Process
DevSecOps Jenkins Pipeline -Security
Extensible markup language attacks
News bytes null 200314121904

Recently uploaded (20)

PDF
Microbial disease of the cardiovascular and lymphatic systems
PDF
Practical Manual AGRO-233 Principles and Practices of Natural Farming
PPTX
Introduction-to-Literarature-and-Literary-Studies-week-Prelim-coverage.pptx
PPTX
Radiologic_Anatomy_of_the_Brachial_plexus [final].pptx
PPTX
Cell Types and Its function , kingdom of life
PDF
OBE - B.A.(HON'S) IN INTERIOR ARCHITECTURE -Ar.MOHIUDDIN.pdf
PDF
01-Introduction-to-Information-Management.pdf
PDF
Complications of Minimal Access Surgery at WLH
PDF
RTP_AR_KS1_Tutor's Guide_English [FOR REPRODUCTION].pdf
PPTX
PPT- ENG7_QUARTER1_LESSON1_WEEK1. IMAGERY -DESCRIPTIONS pptx.pptx
PDF
Module 4: Burden of Disease Tutorial Slides S2 2025
PPTX
school management -TNTEU- B.Ed., Semester II Unit 1.pptx
PPTX
Lesson notes of climatology university.
PDF
LNK 2025 (2).pdf MWEHEHEHEHEHEHEHEHEHEHE
PDF
Black Hat USA 2025 - Micro ICS Summit - ICS/OT Threat Landscape
PDF
Paper A Mock Exam 9_ Attempt review.pdf.
PDF
The Lost Whites of Pakistan by Jahanzaib Mughal.pdf
DOC
Soft-furnishing-By-Architect-A.F.M.Mohiuddin-Akhand.doc
PPTX
Final Presentation General Medicine 03-08-2024.pptx
PPTX
Tissue processing ( HISTOPATHOLOGICAL TECHNIQUE
Microbial disease of the cardiovascular and lymphatic systems
Practical Manual AGRO-233 Principles and Practices of Natural Farming
Introduction-to-Literarature-and-Literary-Studies-week-Prelim-coverage.pptx
Radiologic_Anatomy_of_the_Brachial_plexus [final].pptx
Cell Types and Its function , kingdom of life
OBE - B.A.(HON'S) IN INTERIOR ARCHITECTURE -Ar.MOHIUDDIN.pdf
01-Introduction-to-Information-Management.pdf
Complications of Minimal Access Surgery at WLH
RTP_AR_KS1_Tutor's Guide_English [FOR REPRODUCTION].pdf
PPT- ENG7_QUARTER1_LESSON1_WEEK1. IMAGERY -DESCRIPTIONS pptx.pptx
Module 4: Burden of Disease Tutorial Slides S2 2025
school management -TNTEU- B.Ed., Semester II Unit 1.pptx
Lesson notes of climatology university.
LNK 2025 (2).pdf MWEHEHEHEHEHEHEHEHEHEHE
Black Hat USA 2025 - Micro ICS Summit - ICS/OT Threat Landscape
Paper A Mock Exam 9_ Attempt review.pdf.
The Lost Whites of Pakistan by Jahanzaib Mughal.pdf
Soft-furnishing-By-Architect-A.F.M.Mohiuddin-Akhand.doc
Final Presentation General Medicine 03-08-2024.pptx
Tissue processing ( HISTOPATHOLOGICAL TECHNIQUE

Talking About SSRF,CRLF

  • 1. Talk on SSRF and CRLF Injection. By Mohit Vohra (Security Engineer at Tac Security)
  • 2. Quick overview:- ● What is penetration testing? ● What is web penetration testing?
  • 3. What is CRLF Injection? ● CRLF Injection Vulnerability is a web application vulnerability happens due to direct parsing of user entered data to the response header fields like set cookie without proper sanitation. ● CR and LF are special characters (%0a%0d). ● It is one of the injection attacks, it can be used to escalate more malicious attacks like xss.
  • 6. Mitigations of CRLF:- ● Always follow the rule of never trust user input. ● Sanitize and neutralize all user-supplied data or properly encode output in HTTP headers that would otherwise be visible to users in order to prevent the injection of crlf.
  • 7. What is SSRF? Server-side request forgery is a web security vulnerability that allows an attacker to induce the server-side application to make HTTP requests to an arbitrary domain of attacker’s choosing. SSRF attacks often exploit trust relationships to escalate an attack from the vulnerable application and perform unauthorized actions. These relationships might exist in relation to server itself, or in relation to other back-end systems within the same organization.
  • 9. Mitigations of SSRF:- ● A blacklist is not a good protection because with so many different protocols, schemes, encodings, bypasses will most certainly occur. Because of this, a whitelist is a better approach. ● Proper input validation of data can majorly help the client to protect the web application against unwanted controls or actions.