Testing for blind SSRF with Burp Suite

Поделиться
HTML-код
  • Опубликовано: 23 ноя 2024

Комментарии • 1

  • @safisec
    @safisec Месяц назад

    Thanks for the informative video! I've found and reported many Blind SSRF vulnerabilities where I get internal server IP responses, but they often ask for further exploitation, like accessing internal files (e.g., /etc/passwd) or identifying open ports. Despite following up, many of my reports get marked as N/A. Could you explain the best approach for further exploiting Blind SSRF, such as interacting with internal services or scanning open ports, and how to effectively demonstrate this in a report? Any tips for getting these findings accepted would be appreciated! Thanks again!