Server Side Request Forgery (SSRF)

This page contains my tips and tricks for SSRF exploitation.

Detecting Endpoints

To facilitate the automated identification of endpoints that may be vulnerable, I typically employ regular expressions (regex) in my approach.

(\?|\&)([^=]+)\=https?:\/\/([^&]+)

The regex above detects endpoint with URL parameters.

Capturing Requests

To effectively capture the requests initiated by Server-Side Request Forgery (SSRF), the following methods are my preferred choices:

Juicy Endpoints for Cloud

Common Bypass Techniques

Given that the majority of web applications employ various whitelist and/or blacklist protection mechanisms, it is often necessary to navigate through multiple security layers to achieve successful exploitation. The following methods are my preffered choices:

URL Rewrite

URL format bypasses

Secondary exploitation with a simple PHP web server.

Automating SSRF Discovery

Given that Burp Suite enables the utilization of regular expressions in its match and replace rules, devising an automated process for the detection of Server-Side Request Forgery (SSRF) becomes a relatively straightforward task.

Last updated

Was this helpful?