SSRF Flashcards

1
Q

What is SSRF?

A

SSRF stands for Server-Side Request Forgery, this allows a malicious user to cause a web server to make another edited HTTP request to the resource of the attackers choice.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What’re the two types of SSRF and what do they do?

A

Regular SSRF: Returns data to the attackers screen

and

Blind SSRF: The SSRF will occur, but no data will be returned to the screen of the attacker afterwards

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What are some examples of SSRF?

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What are some examples of SSRF?

A

Expected Request, Path Traversal, and Subdomain Manipulation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

How do you find SSRF vulnerabilities?

A

You will most of the time have to look for specific parameters that are known to have potential SSRF vulnerabilities; examples include: dest, path, url, domain, html, etc.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What are the common SSRF defenses that developers use?

A

There are two primary tools that a developer will use to try and prevent SSRF vulnerabilities: Deny Lists and Allow Lists.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What are Deny Lists?

A

These lists accept all request except request specified in a list with specific patterns and rules.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What are Allow Lists?

A

These lists deny all request except request specified in a list with specific patterns and rules.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Whats Open Redirect?

A

This is an endpoint thats used to automatically take a web visitor to another web address.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

How do you overcome Deny Lists/Allow Lists?

A

You’ll have to essentially spoof the local host IP address or 127.0.0.1, the other way is for the attacker to actually create a subdomain on their own domain.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly