Learn to Hack
Ctrlk
  • Introduction
    • 💀whoami
    • Writeups
  • Where to Start?
    • Learn to hack
    • Web Basics
    • HTTP Basics
    • Networking Basics
    • Linux Basics
    • Programming Basics
    • Hacking and its types
    • Phases of hacking
    • Bug Bounty
  • Learn Hacking
    • Platforms to learn hacking
    • Courses for hacking and cybersecurity
    • Youtube Channels CyberSecurity
    • Bug Bounty Writeups
    • Security Books
    • Security Blogs
    • Security News
  • Practice Hacking
    • Practice hacking skills
  • Security Bugs
    • GQL GraphQL
    • Exploit Payment Gateways
    • Unrestricted File Upload
    • XSS Cross Site Scripting
    • CSRF Cross Site Request Forgery
    • SSRF Server Side Request Forgery
      • SSRF Bypass via OpenRedirect
      • SSRF hunt with httpx & aquatone
      • Real world report PoCs
    • BAC Broken Access Control
    • BOLA Broken Object Level Authorization
    • SQLi SQL Injection
    • RCE Remote Code Execution
    • IDOR Insecure Direct Object Reference
  • Security Tools
    • Recon
    • Exploitation
    • Setup Burp Collaborator Server
    • Miscellaneous
  • Security Verification Standards
    • ASVS Application Security Verification Standard
    • MASVS Mobile Application Security Verification Standard
  • Security Testing Guides
    • Rest API Security Checklist
    • Web Application Testing Techniques
    • Web Security Testing Guide
    • Mobile Security Testing Guide
  • Security findings
    • Security Articles
  • Special Thanks
Powered by GitBook
On this page
  1. Security Bugs
  2. SSRF Server Side Request Forgery

Real world report PoCs

You can read these real world SSRF PoCs to better understand how the bug is exploited in the real world scenarios

  • ESEA Server-Side Request Forgery and Querying AWS Meta Data by Brett Buerhaus

  • SSRF to pivot internal network

  • SSRF to LFI

  • SSRF to query google internal server

  • SSRF by using third party Open redirect by Brett BUERHAUS

  • SSRF tips from BugBountyHQ of Images

  • SSRF to RCE

  • XXE at Twitter

  • Blog post: Cracking the Lens: Targeting HTTP’s Hidden Attack-Surface

Reference: https://whoami.securitybreached.org/2019/06/03/guide-getting-started-in-bug-bounty-hunting/

PreviousSSRF hunt with httpx & aquatoneNextBAC Broken Access Control

Last updated 3 years ago