Server Side request Forgery


Server-side request forgery !


Common injection parameters

"access=",

"admin=",

"dbg=",

"debug=",

"edit=",

"grant=",

"test=",

"alter=",

"clone=",

"create=",

"delete=",

"disable=",

"enable=",

"exec=",

"execute=",

"load=",

"make=",

"modify=",

"rename=",

"reset=",

"shell=",

"toggle=",

"adm=",

"root=",

"cfg=",

"dest=",

"redirect=",

"uri=",

"path=",

"continue=",

"url=",

"window=",

"next=",

"data=",

"reference=",

"site=",

"html=",

"val=",

"validate=",

"domain=",

"callback=",

"return=",

"page=",

"feed=",

"host=",

"port=",

"to=",

"out=",

"view=",

"dir=",

"show=",

"navigation=",

"open=",

"file=",

"document=",

"folder=",

"pg=",

"php_path=",

"style=",

"doc=",

"img=",

"filename="


Try basic localhost payloads


Bypassing filters

Bypass using HTTPS

Bypass with [::]

Bypass with a domain redirection

Bypass using a decimal IP location

Bypass using IPv6/IPv4 Address Embedding

Bypass using malformed urls

Comments

Popular posts from this blog

Two Factor Authentication ! [2FA]