Answer:
Attackers can exploit SSRF to manipulate the server, make requests, and retrieve sensitive data from internal systems.
Attackers can exploit SSRF to manipulate the server, make requests, and retrieve sensitive data from internal systems.
You may be interested in:
Web Security MCQs - PART 2