How to exploit a blind SSRF?

Поделиться
HTML-код
  • Опубликовано: 1 авг 2024
  • 👩‍🎓👨‍🎓 Today, we are going to dive deeper into SSRF by exploiting a blind one using ShellShock in an example lab.
    Overview:
    00:00 Introduction
    00:15 Checking out the webshop
    00:25 Getting a request in Burp
    00:50 Sending request to Repeater
    01:10 Referer header
    02:00 Getting Burp collaborator link
    02:30 Blind SSRF
    03:30 How to exploit blind SSRFs
    04:00 ShellShock
    05:10 Scanning internal network using Intruder
    07:30 Getting RCE using ShellShock
    09:00 Outro
    For more information, check out blog.intigriti.com/hackademy/....
    🔗 Portswigger XXS Challenge: portswigger.net/web-security/...
    ---
    🧑‍💻 Sign up and start hacking right now - go.intigriti.com/register
    👾 Join our Discord - go.intigriti.com/discord
    🎙️ This show is hosted by / pinkdraconian ( @PinkDraconian ) & / intigriti
    👕 Do you want some Intigriti Swag? Check out swag.intigriti.com/

Комментарии • 31

  • @SrRunsis
    @SrRunsis 2 года назад

    THanks so much for this video Intigriti!!!! You guys are awesomee

  • @janekmachnicki2593
    @janekmachnicki2593 11 месяцев назад +1

    Thanks for another briliant tutorial .Great job

  • @hackersguild8445
    @hackersguild8445 2 года назад

    Thanks for sharing. Nice video :)

  • @lol-hz9mc
    @lol-hz9mc 2 года назад +3

    That's an interesting explanation!!! Thanks

    • @intigriti
      @intigriti  2 года назад +1

      Glad you liked it!

  • @tudasuda5501
    @tudasuda5501 2 года назад +1

    Thnx!

  • @huuloc8719
    @huuloc8719 2 года назад +3

    Nice.

  • @shpockboss3834
    @shpockboss3834 2 года назад

    On every target ,do we have to try same IP? or where can we get IP?

    • @intigriti
      @intigriti  2 года назад

      This is something you'd have to guess. Read up on private IP ranges and then you'll see which to scan!

  • @mohmino4532
    @mohmino4532 Год назад +1

    Awesome as usual ma man 🤩 but why did u put this { foo;} ? and what is his role in this process 🙃

    • @intigriti
      @intigriti  Год назад +1

      Thank you! The "foo" bit isn't needed, shellshock payloads often just use "() {:;}" to declare the bash function.

    • @mohmino4532
      @mohmino4532 Год назад +1

      @@intigriti i see thanks again ❤

  • @solo_code_rider4660
    @solo_code_rider4660 2 года назад

    Thanks

  • @alan.m.rebeira
    @alan.m.rebeira 2 года назад +2

    😍😍😍

  • @itsm3dud39
    @itsm3dud39 2 года назад

    i used other commands like id, /etc/passwd .. they are not working.why only whoami command working?

    • @intigriti
      @intigriti  2 года назад

      There could be a number of measures in place preventing you from running other commands.

  • @jacobfurnish7450
    @jacobfurnish7450 Год назад +1

    4:14 when you say is any host in the internal network vuln to shellshock, internal network meaning origin server or would you also have to bypass a CDN like CloudFlare or AWS in order to exploit?

    • @intigriti
      @intigriti  Год назад +1

      Once you've found and exploited the SSRF, it's the web server scanning the internal network which is unlikely to be protected.

  • @fahadfaisal2383
    @fahadfaisal2383 2 года назад +1

    This vulnerability is common is websites?

    • @intigriti
      @intigriti  2 года назад +1

      SSRFs have become quite common!

  • @AnthonyMcqueen1987
    @AnthonyMcqueen1987 2 года назад

    This is it time to shut them down. lol JK

  • @MichaelCooter
    @MichaelCooter 2 года назад +1

    First!