OWASP A10:2021 - Server-Side Request Forgery (SSRF)
Overview
Attack Vectors and Impact
Internal Network Access
Cloud Metadata Exploitation
Data Exfiltration
Common Vulnerable Patterns
URL/Webhook Parameters
Image/File Processing
API Integrations
URL Shortener Services
Detection and Reconnaissance
Initial Discovery
Burp Suite Detection
Manual Testing Checklist
Advanced Exploitation Techniques
Cloud Metadata Exploitation
Protocol-Specific Attacks
Bypass Techniques
Automated Testing Tools
Custom Python Scanner
Burp Suite Extensions
Nuclei Templates
Internal Network Reconnaissance
Port Scanning via SSRF
Service Discovery
Exploitation Scenarios
AWS Credential Extraction
Internal API Access
File Disclosure
Defense Evasion
Time-Based Detection Evasion
Response Size Variation
Testing Methodology
1. Discovery Phase
2. Validation Phase
3. Exploitation Phase
4. Impact Assessment
Mitigation Strategies
Input Validation
Network Segmentation
Application-Level Controls
Detection and Monitoring
Log Analysis
Network Monitoring
Common Testing Pitfalls
False Negatives
False Positives
Business Impact
High Impact Scenarios
Compliance Considerations
Tools and Resources
Detection Tools
Collaborator Services
Cloud-Specific Tools
Last updated