Answer:
Attackers leverage SSRF by manipulating the server to make requests to internal services, enabling interaction with internal network resources.
Attackers leverage SSRF by manipulating the server to make requests to internal services, enabling interaction with internal network resources.
You may be interested in:
Web Security MCQs - PART 2