Transcript
Host (0:02)
You're listening to the Cyberwire network, powered by N2K.
Dave (0:12)
Hey everybody, Dave here. I've talked about Deleteme before and I'm still using it because it still works. It's been a few months now, and I'm just as impressed today as I was when I signed up. Deleteme keeps finding and removing my personal information from data broker sites, and they keep me updated with detailed reports so I know exactly what's been taken down. I'm genuinely relieved. Knowing my privacy isn't something I have to worry about every day. The Delete Me team handles everything. It's the set it and forget it peace of mind. And it's not just for individuals. Deleteme also offers solutions for businesses, helping companies protect their employees personal information and reduce exposure to social engineering and phishing threats. And right now, our listeners get a special deal 20% off your delete me plan. Just go to JoinDeleteMe.com N2K and use promo code N2K at checkout. That's JoinDeleteMe.com N2k code N2K.
Rick Howard (1:28)
The word is OWASP server side request forgery spelled O for open, W for Web, A for application, S for security, P for project server side for the application that runs on the server, in contrast to running on the user's browser or client side and request forgery for unauthorized access requests to servers that are supposed to be private. Definition an attack technique that leverages an unprotected web server as a proxy for attackers to send commands through to other computers. Example Sentence A server side Request forgery or SSRF attack often exploits trust relationships between publicly visible Web servers and private internal servers. Origin and Context Dave Wickers and Jeff Williams, working for Aspect Security, a software consultant company, published an education piece in 2003 on the top software security coding issues of the day that eventually turned into the OWASP Top 10, a reference document describing the most critical security concerns for Web applications. Today, OWASP is an international team of security professionals led by the foundation executive director and top 10 project leader, Andrew Van der Stock, and dedicated to enabling organizations to develop, purchase, and maintain applications and APIs that can be trusted. Today, there are tens of thousands of members and hundreds of chapters Worldwide in the OWASP 2021 Top 10 Vulnerabilities list, SSRF ranks at number 10. In a normal configuration, Web servers typically get requests for information that the web server stores locally on the Cyberwire web page. Users can request a list of all the Cyberwire podcasts, for example, but it also accepts requests for outside information sources. For instance, the WordNotes website page for this word SSRF might like to display a YouTube video that somebody else created on the same topic. These two use cases are normal and perfectly acceptable, but a bad actor can use this functionality to get to other internal servers or data not meant for the public. In other words, instead of asking to see the YouTube video, they might ask to see the source code of the super secret project stored on an internal server. Hackers can't get to the super secret server directly, but they might be able to get to the data indirectly by going through the web server. To mitigate this risk, network defenders should follow their zero trust strategy and limit access to internal assets from the web server to only the employees who need it. In practice, this means that at the application level, the web server is checking the source of the request to verify if the entity is authorized access to the data stored on the internal server. This is a lot easier to say than it is to do. According to owasp, these SSRF attacks are rare, but recently hackers used the technique to successfully compromise two high profile victims, SolarWinds and Capital One. Nerd Reference Professor Messer is a small cybersecurity training company that produces excellent YouTube educational content to prepare it and security professionals for CompTIA, a CompTIA network and COMPTIA security certifications. In this clip he describes the 2019 server side request forgery attack against Capital One.
![OWASP server-side request forgery (noun) [Word Notes] - Hacking Humans cover](/_next/image?url=https%3A%2F%2Fmegaphone.imgix.net%2Fpodcasts%2F859be63c-3fee-11f0-9912-4fde48a7cd93%2Fimage%2F441b0ca2db080b93b935568d381ce462.png%3Fixlib%3Drails-4.3.1%26max-w%3D3000%26max-h%3D3000%26fit%3Dcrop%26auto%3Dformat%2Ccompress&w=1920&q=75)