From f3066722ee82c21f2b9d40e365f1118a747940d2 Mon Sep 17 00:00:00 2001 From: security-is-myth Date: Sat, 7 Nov 2020 22:07:18 +0530 Subject: [PATCH] update SSRF/README.md with java payloads --- Server Side Request Forgery/README.md | 3 +++ 1 file changed, 3 insertions(+) diff --git a/Server Side Request Forgery/README.md b/Server Side Request Forgery/README.md index c7613ab..152b5fb 100644 --- a/Server Side Request Forgery/README.md +++ b/Server Side Request Forgery/README.md @@ -21,6 +21,7 @@ * [Bypass using enclosed alphanumerics](#bypass-using-enclosed-alphanumerics) * [Bypass filter_var() php function](#bypass-filter_var-php-function) * [Bypass against a weak parser](#bypass-against-a-weak-parser) + * [Bypassing using jar protocol (java only)](#bypassing-using-jar-protocol-java-only) * [SSRF exploitation via URL Scheme](#ssrf-exploitation-via-url-scheme) * [file://](#file) * [http://](#http) @@ -249,6 +250,8 @@ make-1.2.3.4-rebind-169.254-169.254-rr.1u.ms ### Bypassing using jar protocol (java only) +Blind SSRF + ```powershell jar:scheme://domain/path!/ jar:http://127.0.0.1!/