Skip to content

Latest commit

 

History

History
24 lines (17 loc) · 1.43 KB

readme.md

File metadata and controls

24 lines (17 loc) · 1.43 KB

Ground control

This is a collection of all my scripts that I use to debug Server Side Request Forgery (SSRF), blind XSS, and insecure XXE processing vulnerabilities. This is still a work in progress, as I'm still collecting all the scripts that I have lingering around. Before using these scripts, I used to rewrite these scripts most of the time or set up listeners with netcat. That wasn't scalable, so I started collecting the scripts in a repository, which can be closed easily every time it's needed it on a server.

Requirements

Running this script requires Ruby 2.3, a valid SSL certificate for a domain you own, and a web server that allows to open port 80, 443, 8080, and 8443. The use of each port will be explained in this document.

Setting up

Clone this repository and install the required components by running install.sh. After that, run start.sh to start to listen on all ports.

Functions

Redirects

The /redirect endpoint is used to redirect a request to another server or endpoint. This may assist you when you need an external server to redirect back to an internal system. See below for examples.

curl -vv "http://server/redirect?url=http://169.254.169.254/latest/meta-data/"

Ping

Sometimes, you simply need a page that responds with a certain body and headers. The /ping endpoint does exactly that. Here's a few examples.

curl -vv "http://server/pingpong?&body=%3ch1%3eHello%3c/h1%3e"