mirror of
https://github.com/swisskyrepo/PayloadsAllTheThings.git
synced 2024-11-14 08:57:37 +00:00
Merge pull request #730 from Horlad/master
Adding r3dir tool to SSRF README.md
This commit is contained in:
commit
11d1704f42
1 changed files with 14 additions and 3 deletions
|
@ -63,8 +63,9 @@
|
|||
- [tarunkant/Gopherus](https://github.com/tarunkant/Gopherus) - Generates gopher link for exploiting SSRF and gaining RCE in various servers
|
||||
- [In3tinct/See-SURF](https://github.com/In3tinct/See-SURF) - Python based scanner to find potential SSRF parameters
|
||||
- [teknogeek/SSRF Sheriff](https://github.com/teknogeek/ssrf-sheriff) - Simple SSRF-testing sheriff written in Go
|
||||
* [assetnote/surf](https://github.com/assetnote/surf) - Returns a list of viable SSRF candidates
|
||||
* [dwisiswant0/ipfuscator](https://github.com/dwisiswant0/ipfuscator) - A blazing-fast, thread-safe, straightforward and zero memory allocations tool to swiftly generate alternative IP(v4) address representations in Go.
|
||||
- [assetnote/surf](https://github.com/assetnote/surf) - Returns a list of viable SSRF candidates
|
||||
- [dwisiswant0/ipfuscator](https://github.com/dwisiswant0/ipfuscator) - A blazing-fast, thread-safe, straightforward and zero memory allocations tool to swiftly generate alternative IP(v4) address representations in Go.
|
||||
- [Horlad/r3dir](https://github.com/Horlad/r3dir) - a redirection service designed to help bypass SSRF filters that do not validate the redirect location. Intergrated with Burp with help of Hackvertor tags
|
||||
|
||||
## Payloads with localhost
|
||||
|
||||
|
@ -263,6 +264,16 @@ vulnerable.com will fetch YOUR_SERVER_IP which will redirect to 192.168.0.1
|
|||
3. You can use response codes [307](https://developer.mozilla.org/en-US/docs/Web/HTTP/Status/307) and [308](https://developer.mozilla.org/en-US/docs/Web/HTTP/Status/308) in order to retain HTTP method and body after the redirection.
|
||||
```
|
||||
|
||||
To perform redirects without hosting own redirect server or perform seemless redirect target fuzzing, use https://github.com/Horlad/r3dir which hosted on r3dir.me
|
||||
|
||||
```powershell
|
||||
#Redirects to http://localhost with `307 Temporary Redirect` status code
|
||||
https://307.r3dir.me/--to/?url=http://localhost
|
||||
|
||||
#Redirects to http://169.254.169.254/latest/meta-data/ with `302 Found` status code
|
||||
https://62epax5fhvj3zzmzigyoe5ipkbn7fysllvges3a.302.r3dir.me
|
||||
```
|
||||
|
||||
### Bypassing using type=url
|
||||
|
||||
```powershell
|
||||
|
@ -927,4 +938,4 @@ More info: https://rancher.com/docs/rancher/v1.6/en/rancher-services/metadata-se
|
|||
- [SSRF: Don't encode entire IP](https://twitter.com/thedawgyg/status/1224547692967342080)
|
||||
- [Pong [EN]| FCSC 2024 - vozec - April 12, 2024](https://vozec.fr/writeups/pong-fcsc2024-en/)
|
||||
- [Pong [EN]| FCSC 2024 - mizu.re - Apr 13, 2024](https://mizu.re/post/pong)
|
||||
- [SSRFmap - Introducing the AXFR module - Swissky - June 13, 2024](https://swisskyrepo.github.io/SSRFmap-axfr/)
|
||||
- [SSRFmap - Introducing the AXFR module - Swissky - June 13, 2024](https://swisskyrepo.github.io/SSRFmap-axfr/)
|
||||
|
|
Loading…
Reference in a new issue