
Server-side request forgery (SSRF) - PortSwigger
In this section we explain what server-side request forgery (SSRF) is, and describe some common examples. We also show you how to find and exploit SSRF ...
Lab: Basic SSRF against the local server - PortSwigger
Server-side request forgery (SSRF) What is SSRF? Impact; Common SSRF attacks. Against the server itself; Against other back-end systems; Circumventing common SSRF defenses. …
Blind SSRF vulnerabilities | Web Security Academy - PortSwigger
How to find and exploit blind SSRF vulnerabilities. The most reliable way to detect blind SSRF vulnerabilities is using out-of-band (OAST) techniques. This involves attempting to trigger an …
Testing for SSRF vulnerabilities with Burp Suite - PortSwigger
Mar 31, 2025 · Server-side request forgery (SSRF) is a web security vulnerability that allows an attacker to induce the server-side application to make requests to an unintended location. You …
Testing for SSRF with Burp Suite - PortSwigger
Mar 31, 2025 · Server-side request forgery (SSRF) is a web security vulnerability that allows an attacker to induce the server-side application to make requests to an unintended location. …
Lab: Basic SSRF against another back-end system
What is SSRF? Impact; Common SSRF attacks. Against the server itself; Against other back-end systems; Circumventing common SSRF defenses. Blacklist-based input filters; Whitelist-based …
URL validation bypass cheat sheet for SSRF/CORS/Redirect
Attack surface visibility Improve security posture, prioritize manual testing, free up time. CI-driven scanning More proactive security - find and fix vulnerabilities earlier. Application security …
Lab: Blind SSRF with out-of-band detection - PortSwigger
What is SSRF? Impact; Common SSRF attacks. Against the server itself; Against other back-end systems; Circumventing common SSRF defenses. Blacklist-based input filters; Whitelist-based …
Lab: SSRF with blacklist-based input filter - PortSwigger
Server-side request forgery (SSRF) What is SSRF? Impact; Common SSRF attacks. Against the server itself; Against other back-end systems; Circumventing common SSRF defenses. …
Lab: Routing-based SSRF | Web Security Academy - PortSwigger
This lab is vulnerable to routing-based SSRF via the Host header. You can exploit this to access an insecure intranet admin panel located on an internal IP address. To solve the lab, access …