Skip to content

Latest commit

 

History

History
111 lines (97 loc) · 5.24 KB

SSRF.md

File metadata and controls

111 lines (97 loc) · 5.24 KB

SSRF ( Server-Side-Request-Forgery)

  • What's SSRF ??
    • SSRF is a type of exploit where an attacker abuses the functionality of a server causing it to access or manipulate information in the realm of that server that would otherwise not be directly accessible to the attacker.

Where to look for ??

  1. If you got Open Redirect try escalating it to SSRF.

  2. gf SSRF to grep parameters may vulnerable to SSRF.

  3. SSRF's are more in API's so crawl the whole web app with burp proxy turned on and search for keywords like., eg :

?url=
?uri=
?req= 
etc.....
  1. Sign up with an Email like blabla.collaborator.net. If u receive HTTP req. in collaborator then its SSRF. But if there's no impact Don't Report it :) DNS and SMTP req. Doesn't matters.

AWS Metadata

Most of the sites use AWS nowadays...

  • AWS localhost is 169.254.169.254 so don't use 127.0.0.1 there!

  • If you found an SSRF vulnerability that runs on EC2, try requesting :

http://169.254.169.254/latest/meta-data/
http://169.254.169.254/latest/user-data/
http://169.254.169.254/latest/meta-data/iam/security-credentials/IAM_USER_ROLE_HERE
http://169.254.169.254/latest/meta-data/iam/security-credentials/flaws/

Escalation

  • SSRF can be Escalated to RCE :) [Impact High]
  • <os cmd>.collaborator.net (thehackerish has a good video in it :)
  • If there's no impact! on your SSRF rather than a redirect try to escalate it to XSS.

Resources 💯

Youtube

Hackerone Reports

Blogs

Github Repos

Author: