Answer:
Attackers can use SSRF to perform port scanning by manipulating the server to make requests to different ports on internal systems.
Attackers can use SSRF to perform port scanning by manipulating the server to make requests to different ports on internal systems.
You may be interested in:
Web Security MCQs - PART 2