During the live stream I will create from scratch a python exploit to blind SSRF in Google Cloud, described in the latest video. The goal will be to leak the access token. I will practice on the lab I have built for you to practice this vulnerability. If you haven’t checked it out yet, go here:
https://mailing.bugbountyexplained.com/gcpssrf

✉️ Sign up for the mailing list ✉️
https://mailing.bugbountyexplained.com/

☕️ Support my channel by buying me a coffee ☕️
https://www.buymeacoffee.com/bountyexplained

? Get $100 in credits for Digital Ocean ?
https://m.do.co/c/cc700f81d215

Add comment

Your email address will not be published. Required fields are marked *