HOW TO FIND SSRF'S?
A full guide on finding SSRF's in bug bounty

HOW TO FIND SSRF'S?

WHAT IS IT?

Tricking a website to make unintended requests to internal resources.


WHERE TO FIND IT?

The following are the most common parts where SSRF's can be found:

  • URL Parsing & Processing
  • File Upload Features


HOW TO FIND SSRF's?

Utilize these payloads to exploit SSRF's:

________________________

?? Follow my newsletter for more tips on crushing bug bounties in 2024!

?? Contact me: [email protected]



要查看或添加评论,请登录

Eman ?ati?的更多文章

  • Exclusive Community Invitation

    Exclusive Community Invitation

    I'm officially opening the first Patreon community for bug bounty hunters. I worked hard to create valuable posts to…

  • The XSS Handbook

    The XSS Handbook

    I've just released my first handbook that will guide you to learning how to hunt for XSS vulnerabilities. This…

    3 条评论
  • How to pick a bug bounty program?

    How to pick a bug bounty program?

    Introduction When starting your bug bounty journey, most people's struggles are picking the "perfect" bug bounty…

    3 条评论
  • How to use AI tools securely? (without doxxing your company)

    How to use AI tools securely? (without doxxing your company)

    As software development teams increasingly adopt artificial intelligence (AI) tools, they gain access to powerful…

    1 条评论
  • How To Use Amass? (like a pro)

    How To Use Amass? (like a pro)

    In this newsletter edition I will shine a light on a tool I that many know about but very few know how to use…

    1 条评论
  • Shodan: Hidden Bug Bounty Tool

    Shodan: Hidden Bug Bounty Tool

    What is Shodan? Shodan is a search engine for Internet-connected devices and a powerful tool for bug hunters. It…

  • How to hack using Google?

    How to hack using Google?

    What is Google Dorking? Technique of utilizing Google search keywords and functions to obtain sensitive information and…

  • How to hack using Google?

    How to hack using Google?

    What is Google Dorking? Technique of utilizing Google search keywords and functions to obtain sensitive information and…

  • How to hack using Google?

    How to hack using Google?

    What is Google Dorking? Technique of utilizing Google search keywords and functions to obtain sensitive information and…

  • How to enumerate JS files?

    How to enumerate JS files?

    Why? A lot of sensitive information is exposed through JS files. There is always a chance a developer made a mistake.

    1 条评论

社区洞察

其他会员也浏览了