Given that the majority of web applications employ various whitelist and/or blacklist protection mechanisms, it is often necessary to navigate through multiple security layers to achieve successful exploitation. The following methods are my preffered choices:
URL Rewrite
URL format bypasses
Secondary exploitation with a simple PHP web server.
Automating SSRF Discovery
Given that Burp Suite enables the utilization of regular expressions in its match and replace rules, devising an automated process for the detection of Server-Side Request Forgery (SSRF) becomes a relatively straightforward task.
nip.io
nip.io allows you to do that by mapping any IP Address to a hostname
using the following formats:
10.0.0.1.nip.io maps to 10.0.0.1
192-168-1-250.nip.io maps to 192.168.1.250
0a000803.nip.io maps to 10.0.8.3