Server-side request Forgery (SSRF) vulnerabilities pose a significant threat to Go applications, allowing attackers to manipulate the destination of web requests. In this lab, learners will gain practical experience identifying and mitigating SSRF vulnerabilities. The typical solution involves preventing users from manipulating request destinations, thus safeguarding against unauthorized access to internal network resources or sensitive data. By providing a virtual environment with a vulnerable application and its source code, this lab empowers developers to understand and address SSRF vulnerabilities effectively.
Equip developers/engineers to identify and mitigate open redirect vulnerabilities in applications to prevent adversaries from redirecting users to malicious websites.
The materials within this course focus on the NICE Framework Task, Knowledge, and Skill statements identified within the indicated NICE Framework component(s):
If you would like to provide feedback on this course, please e-mail the NICCS team at NICCS@mail.cisa.dhs.gov. Please keep in mind that NICCS does not own this course or accept payment for course entry. If you have questions related to the details of this course, such as cost, prerequisites, how to register, etc., please contact the course training provider directly. You can find course training provider contact information by following the link that says “Visit course page for more information...” on this page.