SSRF
What is it?
Exploitation
Bypass SSRF Protection using Domain CNAME A Record: https://www.hahwul.com/2019/02/bypass-ssrf-protection-using-domain-cname-arecord.html
Bypass SSRF Protection using HTTP Redirect: https://www.hahwul.com/2019/02/bypass-ssrf-protection-using-http-redirect.html
Payloads
SSRF Payloads for AWS: https://github.com/cybercdh/hacks/blob/master/ssrf_payloads/aws
Tools
Gopherus: https://github.com/tarunkant/Gopherus
This tool will help you to generate Gopher payload for exploiting SSRF (Server Side Request Forgery) and gaining RCE (Remote Code Execution). And also it will help you to get the Reverse shell on the victim server.
Cheat Sheet
Basic Attack [ref1]
Bypass SSRF with special char [ref1]
Bypass SSRF Domain CNAME & A-Record [ref1]
Bypass SSRF HTTP Redirect [ref1]
SSRF with ESIi [ref1]
Other Resources
Hahwul's SSRF cheatsheet: https://www.hahwul.com/p/ssrf-open-redirect-cheat-sheet.html?m=1
This script takes a domain name and a callback server, parses links , appends SSRF parameters and fire the requests. https://gist.github.com/hussein98d/d09b5990ff339dac8029b1e9248d2875
References
[ref1] : https://www.hahwul.com/p/ssrf-open-redirect-cheat-sheet.html?m=1
Last updated