mirror of
https://github.com/carlospolop/hacktricks
synced 2025-02-16 14:08:26 +00:00
GITBOOK-3812: No subject
This commit is contained in:
parent
cc342552b3
commit
df3103dbf8
1 changed files with 6 additions and 0 deletions
|
@ -144,6 +144,12 @@ If the SSRF is executed by **curl**, curl has a feature called [**URL globbing**
|
|||
file:///app/public/{.}./{.}./{app/public/hello.html,flag.txt}
|
||||
```
|
||||
|
||||
## Capture SSRF Requests
|
||||
|
||||
* Burp Collaborator
|
||||
* [http://requestrepo.com/](http://requestrepo.com/)
|
||||
* [https://app.interactsh.com/](https://app.interactsh.com/)
|
||||
|
||||
## SSRF via Referrer header
|
||||
|
||||
Some applications employ server-side analytics software that tracks visitors. This software often logs the Referrer header in requests, since this is of particular interest for tracking incoming links. Often the analytics software will actually visit any third-party URL that appears in the Referrer header. This is typically done to analyze the contents of referring sites, including the anchor text that is used in the incoming links. As a result, the Referer header often represents fruitful attack surface for SSRF vulnerabilities.\
|
||||
|
|
Loading…
Add table
Reference in a new issue