Skip to content

SSRF stands for Server-Side Request Forgery. It's a web security vulnerability that allows an attacker to induce the server-side application to make HTTP requests to an arbitrary domain of the attacker's choosing.

Notifications You must be signed in to change notification settings

rvarshith2003/ssrf_finder

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

9 Commits
 
 
 
 
 
 
 
 

Repository files navigation

ssrf_finder

This tool is used to find if there are any Server-Side Request Forgery (SSRF) vulnerabilities on a particular website.

Features

It is helpful in finding SSRF attacks on a website. It also has separate word list file named "urls.txt" included which makes it to add any new URL's at ease.

Technologies used

This tool is built using Python programming language.

Installation and Usage

  1. Clone the repository:
  2. Navigate to the project directory.
  3. Install packages needed like Python, flask etc...
  4. Run the SSRF_finder.py file.
  5. Enter the URL for that specific website you want to find for when asked. URL should be in a specific format. Ex - "http://127.0.0.1:5000/?url="
  6. This tool will search for any SSRF vulnerabilities using the list of URL's from urls.txt file.
  7. If there are any vulnerabilities then the tool will show vulnerable URL's
  8. If not then it will show "No vulnerabilities found".

Screenshots

2024-05-03 18_41_22-Kali  Running  - Oracle VM VirtualBox 2024-05-03 18_39_27-Kali  Running  - Oracle VM VirtualBox 2024-05-03 18_43_22-Kali  Running  - Oracle VM VirtualBox

Testing

To test the above tool you can use Python vulnerable website from the repository. The file is named as ssrf_vuln.py.

  1. Navigate to the project directory.
  2. Type "python3 ssrf_vuln.py" to start the vulnerable site.
  3. Then the code will give an IP address, that is used in launching the site. Ex - "127.0.0.1:5000"
  4. Copy and paste this IP address in your browser to start the vulnerable site.

Screenshot

2024-05-03 18_50_46-Kali  Running  - Oracle VM VirtualBox

About

SSRF stands for Server-Side Request Forgery. It's a web security vulnerability that allows an attacker to induce the server-side application to make HTTP requests to an arbitrary domain of the attacker's choosing.

Topics

Resources

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published

Languages