没有合适的资源?快使用搜索试试~ 我知道了~
SSRF漏洞利用总结,类似SQL注入小计的形式,总结地比较完整。
资源推荐
资源详情
资源评论
Table of contents
Table of contents
Basics
Typical attack steps
File Descriptors exploitation way
URL schema support
Protocols SSRF smuggling
Smuggling examples
Apache web-server HTTP parser
Nginx web-server HTTP parser
Vulnerabilities
Basics
Examples
Google Docs
ZeroNights hackquest challenge
Exploitation tricks
Bypassing restrictions
Input validation
Unsafe redirect
DNS pinning
DNS pinning race condition
PHP fsockopen() url parsing tricks
Network restrictions
Protocol fingerprinting
Examples
HTTP
Memcached
Retrieving data
Examples
HTTP response encapsulation into XML formatted response
Console cURL wildcards URL responses concatenation
SMBRelay exploitation
Original request data sniffing
Examples
Memcached
wallarm.com
2
Basics
SSRF - Server Side Request Forgery attacks. The ability to create requests from the
vulnerable server to intra/internet. Using a protocol supported by available URI schemas, you
can communicate with services running on other protocols. Here we collect the various options
and examples (exploits) of such interaction. See for introduction related researches.
Typical attack steps
1. Scan internal network to determine internal infrastructure which you may access
2. Collect opened ports at localhost and other internal hosts which you want (basically by
time-based determination)
3. Determine services/daemons on ports using wiki or daemons banners (if you may watch
output)
4. Determine type of you SSRF combination:
○ Direct socket access (such as this example)
○ Sockets client (such as java URI, cURL, LWP, others)
5. In case of direct socket access determine CRLF and other injections for smuggling
6. In case of sockets client, determine available URI schemas
7. Compare available schemas and services/daemons protocols to find smuggling
possibilities
8. Determine host-based auth daemons and try to exploit it
File Descriptors exploitation way
Useful in clouds, shared hostings and others large infrastructures. First read slides 20-21
about FDs and 22-23 about ProcFS from this paper.
There are three ways to access to FDs:
● Interpreters API (such as fd:// wrapper for PHP)
○ If there are no such API or required functions disabled, you can try to load native
extension:
■ PHP (require dlopen, but not exec):
https://github.com/dhotson/fdopen-php
● exec() call from API (such as exec(‘echo 123 > &<FDN>’);)
○ you may access only FDs without O_CLOEXEC flag.
○ C program to scan available FDs is here:
https://github.com/ONsec-Lab/scripts/blob/master/list-open-fd.c.
● ProcFS files (/proc/<PID>/fd/<N>)
* Note, that you can not access to sockets through /proc/<PID>/fd/<N> files!
wallarm.com
4
剩余22页未读,继续阅读
资源评论
qq_21239107
- 粉丝: 1
- 资源: 4
上传资源 快速赚钱
- 我的内容管理 展开
- 我的资源 快来上传第一个资源
- 我的收益 登录查看自己的收益
- 我的积分 登录查看自己的积分
- 我的C币 登录后查看C币余额
- 我的收藏
- 我的下载
- 下载帮助
最新资源
- (源码)基于Java的图书馆借阅系统.zip
- C#ASP.NET大型合同管理系统源码 项目合同源码数据库 SQL2008源码类型 WebForm
- (源码)基于Arduino的温湿度传感器与OLED显示屏显示系统.zip
- Type C PCB封装库 6Pin 24Pin 有公头、有母头分享下载Altium格式
- btstack协议栈-HID Mouse Classic
- (ARM-LINUX)C源码-课程设计.zip
- btstack协议栈实战篇-HID Keyboard Classic
- 自然语言处理大作业Python实现基于词典的分词方法源代码+实验报告(高分项目)
- 基于C++实现的交互界面计算器程序项目源码+详细代码注释(高分项目)
- 数据库期末作业基于Python+mysql的餐厅点餐系统源码+数据库+文档说明(高分项目)
资源上传下载、课程学习等过程中有任何疑问或建议,欢迎提出宝贵意见哦~我们会及时处理!
点击此处反馈
安全验证
文档复制为VIP权益,开通VIP直接复制
信息提交成功