nullcon Delhi 2012: Day 2's action
In this session, Riyaz Walikar demonstrated how an attacker could abuse the functionality that Web applications provide to pull data from other Internet facing Web Applications for internal use or to verify application availability.
Executive brief for this session (PDF)
Follow @SearchSecIN |