SSRF - Lab #7 Blind SSRF with Shellshock exploitation | Short Version
Автор: Rana Khalil
Загружено: 2022-01-09
Просмотров: 19212
Описание:
In this video, we cover Lab #7 in the SSRF module of the Web Security Academy. The site uses analytics software which fetches the URL specified in the Referer header when a product page is loaded. To solve the lab, we use this functionality to perform a blind SSRF attack against an internal server in the 192.168.0.X range on port 8080. In the blind attack, we use a Shellshock payload against the internal server to exfiltrate the name of the OS user.
▬ ✨ Support Me ✨ ▬▬▬▬▬▬▬▬▬▬
Buy my course: https://bit.ly/30LWAtE
▬ 🔗 Links 🔗 ▬▬▬▬▬▬▬▬▬▬
Notes.txt document: https://github.com/rkhal101/Web-Secur...
Web Security Academy Exercise Link: https://portswigger.net/web-security/...
Rana's Twitter account: / rana__khalil
Повторяем попытку...
Доступные форматы для скачивания:
Скачать видео
-
Информация по загрузке: