Server-side request forgery (SSRF)
https://portswigger.net/web-security/ssrf
Lab: Basic SSRF against the local server
This lab has a stock check feature which fetches data from an internal system.
Lab: Basic SSRF against another back-end system
This lab has a stock check feature which fetches data from an internal system.
→ Sniper Attack with numbers
Lab: SSRF with blacklist-based input filter
This lab has a stock check feature which fetches data from an internal system. The developer has deployed two weak anti-SSRF defenses that you will need to bypass.
localhost - blocked
127.0.0.1 - blocked
2130706433 - bypassed
017700000001 - bypassed
127.1 - bypassed
admin - blocked
%61%64%6d%69%6e - admin url all chars encoded - blocked
%25%36%31%25%36%34%25%36%64%25%36%39%25%36%65 - admin url double all chars encoded - bypassed
Lab: SSRF with whitelist-based input filter
This lab has a stock check feature which fetches data from an internal system. The developer has deployed an anti-SSRF defense you will need to bypass.
Error → "External stock check host must be stock.weliketoshop.net"
https://www.blackhat.com/docs/us-17/thursday/us-17-Tsai-A-New-Era-Of-SSRF-Exploiting-URL-Parser-In-Trending-Programming-Languages.pdf
Lab: SSRF with filter bypass via open redirection vulnerability
This lab has a stock check feature which fetches data from an internal system. The stock checker has been restricted to only access the local application, so you will need to find an open redirect affecting the application first.
Lab: Blind SSRF with out-of-band detection
This site uses analytics software which fetches the URL specified in the Referer header when a product page is loaded.
Collaborator address: pxq0vdgf9ukiw23j0koup8bsbjh95y.burpcollaborator.net
Lab: Blind SSRF with Shellshock exploitation
This site uses analytics software which fetches the URL specified in the Referer header when a product page is loaded.
To solve the lab, use this functionality to perform a blind SSRF attack against an internal server in the 192.168.0.X range on port 8080. In the blind attack, use a Shellshock payload against the internal server to exfiltrate the name of the OS user.
Collaborator address: hdysb5w7pm0acujbgc4m50rkrbx2lr.burpcollaborator.net
Shellshock: https://www.exploit-db.com/exploits/34765
→ Sniper Attack - Number 0-255
The Collaborator server received a DNS lookup of type AAAA for the domain name peter-rmQazs.hdysb5w7pm0acujbgc4m50rkrbx2lr.burpcollaborator.net.
Last updated