(Response) Splitting Up Reverse Proxies To Reach Internal Only Paths
When I’m carrying out security research into a thing, I generally don’t like to Google prior research right away. I know, this completely goes against how you would (and should!) carry out any research; starting with a literature review to find the lay of the land and existing research done in the area to then expand upon. However, I have a habit of getting that light bulb idea or concept and acting upon it right away, rolling up my sleeves and putting my wellies on, ready to get dirty. This sometimes (a lot of times!) ends up coming back to bite me but my reason for doing so is that I don’t want to be swayed by other people. I want to explore my research idea pure and without bias, arriving at the destination without being led off course by others. If I go down the wrong rabbit hole, I want it to be because I’ve decided to jump down it, before I then come out again only to jump down another. It is not until the end if the idea works out (or hasn’t how I had hoped) that I then start googling.
React to this headline: