🧠 Staycyonline Knowledge Base

            • Level 1 - buckets of fun
            • Level 2
            • Level 3
            • Learnings from Humla session 1 june
            • AWS Red Team
          • IAM
          • Azure Cli and Powershell
          • enumeration
          • Initial research
          • Thunder CTF
        • Active Information Gathering
        • Active Information Gathering 1
        • ARP Poisoning
        • Blue Keep
        • Bug bounty mistakes-tips
        • Credential Stuffing
        • Cross site request forgery - CSRF
        • Cross site Scripting - XSS
        • CSRF in JSON body
        • Email OSINT (Recon)
        • Eternal Blue
        • Filtering basics - with TShark
        • FTP
        • FTP - Port 21
        • FTP - Port 21 - Enumeration
        • FTP - Port 21 - Exploitation
        • HTTP
        • JWT
        • Mapping a Network
        • Mapping a Network 1
        • Metasploit framework
        • Microsoft IIS
        • MSFVenom Cheat sheet
        • Oauth
        • Open URL Redirects
        • owasp zap + burp
        • Passive Information Gathering
        • Passive Information Gathering 1
        • Password breaches
        • Port 21 FTP
        • Port 22 SSH Enum and Attacking
        • Port 80 - http
        • Port 139,445 - SMB
        • Port 873 - rsync
        • Port 3389 - RDP
        • Port 6379 - Redis caching servers
        • Port 27017 - Mongodb
        • Race conditions
        • RDP
        • Resources
        • Reverse shell vs bind shell
        • SMB
        • SMB Basics
        • SMB relay attacks
        • SQL
        • SSH
        • Staged vs Non staged payloads
        • Telnet
        • Tshark
        • Web in depth
        • xss payloads
        • Commonly exploited linux vuln
        • Cron Job exploitation
        • Dirty Pipe (CVE-2022-0847)
        • Downloading files
        • Exploiting Bash
        • Exploiting SUID binaries
        • Linux - Enumeration
        • Linux - Privilege Escalation
        • Linux Cred Dumping
        • Linux Kernel exploits
        • ⚠️ Bashed
        • ✋Brainfuck (on hold as it is confusing)
        • 🗂️Index of HTB Writeups
        • Blue ✅⁉️
        • Devel
        • Editorial
        • Fawn
        • LAME ✅
        • Legacy✅
        • Nibbles
        • permX
        • Pilgrimage
        • Sense✅
        • Sunday ✅
        • TenTen
        • TenTen 1
        • TwoMillion
        • Access Control Model
        • AD Defense
        • Domain Enumeration
        • Domain Enumeration using Bloodhound
        • Enumeration Cheatsheet AD
        • Group Policy
        • Introduction to Active Directory
        • LLMNR Poisoning
        • Local Privilage Escalation
        • Local Privilage Escalation Cheatsheet
        • Local Privilege Escalation
        • Microsoft AD Module
        • Password Cracking with Hashcat
        • Powerview
        • Privilage Escalation using Feature Abuse
        • Privilege Escalation using Feature Abuse
        • Trusts
        • Az 900
        • Activities
        • Android App Components
        • Android Applications
        • Android Architcture
        • Android Dynamic analysis
        • Android Manifest.xml
        • Android red team
        • Android Static Analysis
        • Architecture
        • Broadcast Recievers
        • Certificate transparancy issue
        • Connecting Vitrual VM to a Physical Android Device over adb
        • Content providers
        • Humla android workshop
        • Injured Android Walkthrough
        • Intent Filters
        • Intents
        • Mobile Application Pentesting Process
        • Patching an app manually
        • Pentest process
        • Pentest process 1
        • Possible issues
        • Pull Apps from Playstore
        • Resources
        • Services
        • Shared Preferences
        • Signatures in Android App
        • Apps
        • Burp Mobile assistant
        • Emulator Options
        • Frida and objection
        • Getting IPA files
        • Installing ipa files directly
        • ios Architecture
        • ios filesystem
        • Jailbreaking - Notes and Resources
        • Lab Setup
        • Learnings from Null Humla Session Blr - 01 Feb 2025
        • Objection on ipa - patching
        • Proxyman (Alternative to burp)
        • setting up mac os on VM
        • Static Analysis
        • API Active Recon
        • API Authentication Attacks
        • API Authorization Attacks
        • API Passive Recon
        • API Recon
        • Combining techniques
        • Content type vulnerabilities
        • Evasive Measures
        • Excessive Data Exposure
        • GraphQL - Humla
        • Improper Asset Management
        • Injection Attacks
        • Mass Assignment Attack
        • Methodology - Checklist
        • Reverse Engineering an API
        • scan with zap (manual)
        • SSRF
        • Tools
        • Vulns
        • X forwarded for header to bypass auth
        • Code review
        • 1 Intro
        • 2 Elements of a prompt
        • 3. Use case
        • Offensive Approach
        • Docker Basics
        • Hacking docker
        • Humla container sec
        • API Integration Patterns
        • Building an Identity Architecture
        • Federation
        • Alternate data streams
        • Dumping hashes with Mimikatz
        • Kernel Explots - Win Priv Esc
        • Microsoft IIS + Webdav
        • Pass the hash
        • Searching for passwords in windows config files
        • UAC Bypass
        • Windows
        • Windows - Privilege Escalation 1
        • Windows Access Tokens - Token Impersonation
        • Windows Password Hashes
        • WINRM
      • Engineering Blogs links
      • Iot hacking bsides notes
      • Knowledge Store
      • Learnings from Source code review null humla - 12th May 2024
      • Tools you need for Bug Bounty
      • Tunneling Traffic via SSH
      • Dataview
      • Excalibrain
      • Excalidraw
      • Leaflet
      • What is this❓
      • Productivity
      • Random Business Knowledge
      • Learnings from Zseano's methodology
      • Life is short - So is this book
      • grading
      • Settings for reels
      • tips
        • 1. Installation
        • 2. Hello World
        • 3. Functions, Macros, Comments and Errors
      • Algorithm design techniques
      • Asymptotic Notation
        • 🗂️ TEMPLATE - INDEX
        • Note Template
        • Plan to learn template
        • Quick note template
        • Basic note
        • Dataview queries
        • Using leaflet plugin
      • 2025-03-05
      • Learnings
      • Make myself better
      • Tunneling
    Home

    ❯

    👽 Security

    ❯

    🔌 API

    ❯

    SSRF

    SSRF

    May 06, 20251 min read

    See Also : https://portswigger.net/web-security/all-labs#server-side-request-forgery-ssrf

    Occurs due to lack of input validation - attacker supplies own input to control remote resources that are retrieved by target server

    Impact: Access to private data or complete compromise


    ifconfig pro burp collab cannarytokrns.org webhook.site


    Graph View

    Backlinks

    • Open URL Redirects

    Created with Quartz v4.4.0 © 2025

    • GitHub
    • Discord Community