SSRF

What is it?

Exploitation

Bypass SSRF Protection using Domain CNAME A Record: https://www.hahwul.com/2019/02/bypass-ssrf-protection-using-domain-cname-arecord.htmlarrow-up-right

Bypass SSRF Protection using HTTP Redirect: https://www.hahwul.com/2019/02/bypass-ssrf-protection-using-http-redirect.htmlarrow-up-right

Payloads

SSRF Payloads for AWS: https://github.com/cybercdh/hacks/blob/master/ssrf_payloads/awsarrow-up-right

Tools

Gopherus: https://github.com/tarunkant/Gopherusarrow-up-right

  • This tool will help you to generate Gopher payload for exploiting SSRF (Server Side Request Forgery) and gaining RCE (Remote Code Execution). And also it will help you to get the Reverse shell on the victim server.

Cheat Sheet

Basic Attack [ref1]

?url=http://localhost/server-status
?url=http://127.0.0.1/server-status
?url=http://internal_domain/page
?url=http://internal_ip(192.138.0.14)/page

Bypass SSRF with special char [ref1]

Bypass SSRF Domain CNAME & A-Record [ref1]

Bypass SSRF HTTP Redirect [ref1]

SSRF with ESIi [ref1]

Other Resources

Hahwul's SSRF cheatsheet: https://www.hahwul.com/p/ssrf-open-redirect-cheat-sheet.html?m=1arrow-up-right

This script takes a domain name and a callback server, parses links , appends SSRF parameters and fire the requests. https://gist.github.com/hussein98d/d09b5990ff339dac8029b1e9248d2875arrow-up-right

References

[ref1] : https://www.hahwul.com/p/ssrf-open-redirect-cheat-sheet.html?m=1arrow-up-right

Last updated