In this video, I demonstrate how to exploit Server-Side Request Forgery (SSRF) to scan an internal network (192.168.0.X) and access an admin interface on port 8080 to delete the user "carlos."
Lab Summary:
The application has a stock check feature that queries an internal system.
The target admin interface is hosted on an internal IP (192.168.0.X) on port 8080.
Our goal is to use SSRF to enumerate the internal network, find the admin panel, and send a request to delete the user "carlos."
🛠️ Exploitation Techniques Used:
✅ Modifying the stock check URL to target an internal network (192.168.0.X)
✅ Scanning internal IPs by observing response differences
✅ Finding the admin panel on port 8080
✅ Sending a request to delete "carlos" via SSRF
Why This Matters?
SSRF is commonly used to pivot into internal networks, especially in cloud environments and corporate infrastructures. Attackers use this technique to:
✅ Enumerate internal services (port scanning)
✅ Access sensitive endpoints (admin panels, metadata APIs)
✅ Exploit internal APIs that aren't exposed to the internet
⚡ Stay Updated!
🔔 Subscribe for more bug bounty tips, hacking tutorials, and PortSwigger lab walkthroughs!
👍 Like & Share if you found this helpful!
#BugBounty #SSRF #EthicalHacking #PortSwigger #CyberSecurity #WebSecurity
コメント