A vulnerability where an attacker can make a server perform requests to unintended locations, potentially accessing internal services, cloud metadata, or other protected resources.
Put theory into practice with real hacking labs, CTF challenges, and guided courses on Parrot CTFs Events.
Get Started Free