The struggle between data defenders and knowledge thieves has been described as a cat-and-mouse game As quickly because the white hats counter one form of black-hat malicious habits, one other malevolent kind rears its ugly head. technology information In 2017, Mladenov and Mainka pointed out 5 , Section 2.1.2 that a malicious Discovery Service could be used to launch an SSRF assault against a Service Supplier. Thus, the attacker can use SSRF for port scans or for retrieving data. Additionally, gaining access to the endpoint configuration, administrative users could launch SSRF attacks on the Service Provider by design. Relying on the precise setup, this yields to extreme safety implications, particularly contemplating hosted and cloud companies.