mirror of
https://github.com/swisskyrepo/PayloadsAllTheThings.git
synced 2026-01-05 09:17:09 -08:00
GMSA Password + Dart Reverse Shell
This commit is contained in:
BIN
Server Side Request Forgery/Images/SSRF_PDF.png
Normal file
BIN
Server Side Request Forgery/Images/SSRF_PDF.png
Normal file
Binary file not shown.
|
After Width: | Height: | Size: 67 KiB |
@@ -223,7 +223,7 @@ http://127.1.1.1:80:\@@127.2.2.2:80/
|
||||
http://127.1.1.1:80#\@127.2.2.2:80/
|
||||
```
|
||||
|
||||

|
||||

|
||||
|
||||
### Bypassing using a redirect
|
||||
[using a redirect](https://portswigger.net/web-security/ssrf#bypassing-ssrf-filters-via-open-redirection)
|
||||
@@ -433,6 +433,8 @@ gopher://127.0.0.1:6379/_save
|
||||
|
||||
## SSRF exploiting PDF file
|
||||
|
||||

|
||||
|
||||
Example with [WeasyPrint by @nahamsec](https://www.youtube.com/watch?v=t5fB6OZsR6c&feature=emb_title)
|
||||
|
||||
```powershell
|
||||
|
||||
Reference in New Issue
Block a user