InfoSec Write-ups

A collection of write-ups from the best hackers in the world on topics ranging from bug bounties and CTFs to vulnhub machines, hardware challenges and real life encounters. Subscribe to our weekly newsletter for the coolest infosec updates: https://weekly.infosecwriteups.com/

Follow publication

SSRF Advanced Methodology✨

Abhijeet Kumawat
InfoSec Write-ups
Published in
3 min read6 days ago

Free Article Link

By Abhijeet Kumawat, Jr. Security Consultant, Bug Bounty Hunter

What is SSRF? 🛡️🔥

Server-Side Request Forgery (SSRF) allows attackers to manipulate a server into sending malicious requests, often bypassing firewalls to access sensitive data, cloud metadata, internal APIs, or internal networks. 🛠️💻

Created by Copilot

Why is SSRF Critical? ❓💥

  • 🧱 Access internal services and hidden endpoints.
  • ☁️ Obtain cloud instance metadata (AWS, GCP).
  • 🕵️‍♂️ Perform internal network scans.
  • 🧨 Exploit further by chaining SSRF with RCE.

Detailed SSRF Methodology 📚🔍

1. Subdomain Enumeration 🔍🗺️

  • Tools: 🛠️ Subfinder, Amass, Assetfinder, CRT.sh, Chaos.
  • Where to Find Bugs: 🐛 Look for internal subdomains like dev.target.com, staging.target.com, or api.target.com. Test staging environments as they often have misconfigured SSRF protections.
  • Commands: 🖥️
subfinder -d target.com -o subdomains.txt amass enum -active -d target.com -o amass_subdomains.txt chaos -d target.com -o chaos_subdomains.txt

2. Live Domain Detection 🛠️🌐

  • Tools: HTTPX, Httprobe, Naabu.
  • Where to Find Bugs: 🔍 Services running on uncommon ports (e.g., 8080, 8443, 8888).
  • Commands: 💻
cat subdomains.txt | httpx -threads 150 -silent -status-code -o live_domains.txt naabu -list live_domains.txt -p 80,443,8080,8443,8888 -o open_ports.txt

3. URL Enumeration and Filtering 🔗🧵

  • Tools: gauplus, Katana, Waybackurls, hakrawler.
  • Where to Find Bugs: 📍 URLs with parameters like ?url=, ?next=, ?redirect=, ?link=.

Create an account to read the full story.

The author made this story available to Medium members only.
If you’re new to Medium, create a new account to read this story on us.

Or, continue in mobile web

Already have an account? Sign in

Published in InfoSec Write-ups

A collection of write-ups from the best hackers in the world on topics ranging from bug bounties and CTFs to vulnhub machines, hardware challenges and real life encounters. Subscribe to our weekly newsletter for the coolest infosec updates: https://weekly.infosecwriteups.com/

Written by Abhijeet Kumawat

Radhe Radhe ✨ || Jr. Security Consultant || Security Researcher || Bug Hunter || Web Application Penetration Tester || Ethical Hacker ||

Responses (2)

Write a response

Nice writeup sir

--

Nice work!

--