Loopus

Pro Content

This lesson requires Loopus Pro access. Upgrade to unlock all courses, labs, and challenges.

Web Application HackingServer-Side Vulnerabilities

SSRF Attacks

30 min
lab
+70 XP

Learning Objectives

  • Understand Server-Side Request Forgery
  • Learn to exploit SSRF for internal network access
  • Master SSRF bypass techniques

Server-Side Request Forgery (SSRF)

SSRF vulnerabilities allow attackers to make the server perform requests to unintended locations. By abusing the server network position and trust relationships, attackers can access internal services, cloud metadata, and other protected resources.

Understanding SSRF

Many applications fetch resources from URLs for displaying images, checking links, or integrating with APIs. When attackers control these URLs, they redirect requests to internal resources.

Basic SSRF Exploitation

Testing for SSRF involves submitting internal addresses like 127.0.0.1 or cloud metadata endpoints. Successful access reveals internal services unavailable from outside.

Cloud Metadata Endpoints

SSRF in cloud environments often targets metadata services. AWS, GCP, and Azure all expose instance metadata at special IP addresses that can reveal credentials and configuration.

SSRF Bypass Techniques

Applications often implement URL filtering. Common bypasses include alternate IP representations (decimal, hex, octal), URL encoding, DNS rebinding, and redirect chains.

SSRF Impact

Successful SSRF can lead to reading sensitive internal data, accessing cloud credentials and secrets, port scanning internal networks, exploiting internal services, and bypassing firewalls and access controls.

Prevention

Defend against SSRF with URL validation against allowlists, blocking internal IP ranges, disabling HTTP redirects, using separate network segments, and implementing egress filtering.

Answer the Questions0 / 4 completed

📚 KnowledgeQuestion 1

Attacking internal systems via the server is?

Format: ****(4 chars)
Exact match required
⌨️ Hands-OnQuestion 2

What IP loops back to the local host?

Format: *********(9 chars)
Exact match required
📚 KnowledgeQuestion 3

What IP exposes cloud instance metadata?

Format: ***************(15 chars)
Exact match required
⌨️ Hands-OnQuestion 4

What protocol handler allows raw TCP payload SSRF?

Format: ******(6 chars)
Exact match required
Answer all questions correctly to unlock the next lesson

Interactive Sandbox

Loading sandbox...

Submit Flag

Found the flag? Submit it below to complete this lesson.
Format: LOOPUS{...}

Previous
Answer all questions to continue