├── Dockerfile ├── Host_header ├── README.md ├── default └── images │ ├── Nginx_config.png │ ├── SSRF.png │ ├── actual_request.png │ └── readme.md ├── LICENSE.md ├── README.md └── www ├── DNS Rebinding based Bypass ├── README.md └── images │ ├── DNS_Rebinding_Attack_1.png │ ├── DNS_Rebinding_Attack_10.png │ ├── DNS_Rebinding_Attack_11.png │ ├── DNS_Rebinding_Attack_12.png │ ├── DNS_Rebinding_Attack_13.png │ ├── DNS_Rebinding_Attack_2.png │ ├── DNS_Rebinding_Attack_3.png │ ├── DNS_Rebinding_Attack_4.png │ ├── DNS_Rebinding_Attack_5.png │ ├── DNS_Rebinding_Attack_6.png │ ├── DNS_Rebinding_Attack_7.png │ ├── DNS_Rebinding_Attack_8.png │ ├── DNS_Rebinding_Attack_9.png │ └── README.md ├── DNS-Spoofing-based-Bypass ├── README.md └── images │ ├── README.md │ ├── dns spoofing 1.png │ ├── dns spoofing 2.png │ ├── dns spoofing 3.png │ ├── dns spoofing 4.png │ ├── dns spoofing 5.png │ ├── dns spoofing 6.png │ └── dns spoofing 7.png ├── File_Download ├── README.md └── images │ ├── README.md │ ├── file_download_1.png │ ├── file_download_10.png │ ├── file_download_11.png │ ├── file_download_2.png │ ├── file_download_3.png │ ├── file_download_4.png │ ├── file_download_6.png │ ├── file_download_7.png │ ├── file_download_8.png │ └── file_download_9.png ├── Remote_host_connect_interface ├── README.md └── images │ ├── MySQL_Connect_1.png │ ├── MySQL_Connect_2.png │ ├── MySQL_Connect_3.png │ ├── MySQL_Connect_4.png │ ├── MySQL_Connect_5.png │ ├── MySQL_Connect_6.png │ ├── MySQL_Connect_7.png │ └── README.md ├── XML ├── images │ └── README.md ├── sample_upload.xml └── ssrf_using_xxe.xml ├── all.css ├── dns-spoofing.php ├── dns_rebinding.php ├── download.php ├── file_content_fetch ├── README.md └── images │ ├── README.md │ ├── file1.png │ ├── file2.png │ ├── file3.png │ ├── file4.png │ ├── file5.png │ └── file6.png ├── file_get_content.php ├── head.php ├── images ├── README.md ├── SSRF_Vulnerable_Lab.png ├── head.jpg ├── indishell.jpg ├── matrix2.gif ├── ssrf_lab.gif └── who.jpg ├── index.php ├── local.txt ├── pdf_generator ├── images │ ├── README.md │ ├── w1.png │ ├── w2.png │ ├── w3.png │ ├── w4.png │ ├── w5.png │ ├── wk1.png │ ├── wk2.png │ ├── wk3.png │ └── wk4.png ├── readme.md └── weasy.py ├── pdf_ssrf_weasyprint.php ├── pdf_ssrf_wkhtmltopdf.php ├── sql_connect.php └── xml_ssrf.php /Dockerfile: -------------------------------------------------------------------------------- 1 | FROM php:7.2-apache 2 | 3 | RUN apt update && apt install -y xvfb libfontconfig wkhtmltopdf build-essential python-dev python-pip python-cffi libcairo2 libpango1.0-0 libpangocairo-1.0.0 libgdk-pixbuf2.0-0 libffi-dev shared-mime-info && python2 -m pip install "weasyprint<43" 4 | 5 | 6 | RUN docker-php-ext-install mysqli pdo pdo_mysql && docker-php-ext-enable mysqli 7 | RUN chown www-data:www-data /var/www/html/ 8 | 9 | ADD www /var/www/html/ 10 | 11 | 12 | EXPOSE 80 13 | CMD ["apache2ctl", "-D", "FOREGROUND"] 14 | -------------------------------------------------------------------------------- /Host_header/README.md: -------------------------------------------------------------------------------- 1 | ### Description: 2 | 3 | This is a Host-header based SSRF example. In this type of SSRF, any IP/Hostname entered in the host header is parsed by the vulnerable server. 4 | The vunerable server ends up routing the request to the specified domain/IP and retrieves the contents, returning them in the HTTP response. This type of misconfiguration can easily be exploited to exfiltrate data from sensitive locations (e.g. Internal locations, AWS metadata, local files, etc.) 5 | 6 | This misconfiguration is usually seen in web servers that act like a proxy, such as Squid proxy, Nginx and Apache. 7 | 8 | 9 |
34 | 35 | 36 | |
59 | The provided IP is from Private range and hence not allowed 60 | 61 | |
81 | Tyring to access Localhost o_0 ? 82 | 83 | |
![]() | 106 | --==[[Greetz to]]==-- Zero cool, code breaker ica, root_devil, google_warrior, INX_r0ot, Darkwolf indishell, Baba, Silent poison India, Magnum sniper, ethicalnoob Indishell, Local root indishell, Irfninja indishell Reborn India, L0rd Crus4d3r, cool toad, Hackuin, Alicks, Gujjar PCP, Bikash, Dinelson Amine, Th3 D3str0yer, SKSking, rad paul, Godzila, mike waals, zoo zoo, cyber warrior, shafoon, Rehan manzoor cyber gladiator,7he Cre4t0r, Cyber Ace, Golden boy INDIA, Ketan Singh, Yash, Aneesh Dogra, AR AR, saad abbasi, hero, Minhal Mehdi, Raj bhai ji, Hacking queen and rest of TEAM INDISHELL 107 | --==[[Love to]]==-- # My Father, my Ex Teacher, cold fire hacker, Mannu, ViKi, Ashu bhai ji, Soldier Of God, Bhuppi, Gujjar PCP, 108 | Mohit, Ffe, Ashish, Shardhanand, Budhaoo, Jagriti, Salty, Hacker fantastic, Jennifer Arcuri and Don(Deepika kaushik) 109 | 110 | 111 | |
Domain: - '.$host = $url_parts["host"].'';
10 |
11 | if (filter_var($host, FILTER_VALIDATE_IP, FILTER_FLAG_IPV4)) {
12 | $ip = $host;
13 | } else {
14 | $ip = dns_get_record($host, DNS_A);
15 | if (count($ip) > 0) {
16 | $ip = $ip[0]["ip"];
17 | echo " Resolved to IP: - {$ip} "; 18 | 19 | } else { 20 | die(" Your host couldn't be resolved man..."); 21 | } 22 | } 23 | 24 | foreach ($disallowed_cidrs as $cidr) { 25 | if (in_cidr($cidr, $ip)) { 26 | die(" That IP is a blacklisted cidr ({$cidr})!"); // Stop processing if domain reolved to private/reserved IP 27 | } 28 | } 29 | 30 | 31 | echo " Domain IP is not private, Here goes the data fetched from remote URL |
50 |
51 | ####################################################################################################################################################### 52 | --==[[ DNS Rebinding SSRF Vulnerable Code ]]==-- 53 | --==[[ With Love From Team IndiShell ]]==-- 54 |
55 |
57 |
58 | #######################################################################################################################################################
59 | | 61 | --==[[Greetz to]]==-- Zero cool, code breaker ica, root_devil, google_warrior, INX_r0ot, Darkwolf indishell, Baba, Silent poison India, Magnum sniper, ethicalnoob Indishell, Local root indishell, Irfninja indishell Reborn India, L0rd Crus4d3r, cool toad, Hackuin, Alicks, Gujjar PCP, Bikash, Dinelson Amine, Th3 D3str0yer, SKSking, rad paul, Godzila, mike waals, zoo zoo, cyber warrior, shafoon, Rehan manzoor cyber gladiator,7he Cre4t0r, Cyber Ace, Golden boy INDIA, Ketan Singh, Yash, Aneesh Dogra, AR AR, saad abbasi, hero, Minhal Mehdi, Raj bhai ji, Hacking queen and rest of TEAM INDISHELL 62 | --==[[Love to]]==-- # My Father, my Ex Teacher, cold fire hacker, Mannu, ViKi, Ashu bhai ji, Soldier Of God, Bhuppi, Gujjar PCP, 63 | Mohit, Ffe, Ashish, Shardhanand, Budhaoo, Jagriti, Salty, Hacker fantastic, Jennifer Arcuri and Don(Deepika kaushik) 64 | 65 | 66 | 67 | 68 | ####################################################################################################################################################### 69 | |
92 | 93 | 94 | |
116 | Dear Nigga, Trying to access Localhost o_0 ? 117 | 118 | |
71 | 72 | 73 | |
![]() | 88 | --==[[Greetz to]]==-- Zero cool, code breaker ica, root_devil, google_warrior, INX_r0ot, Darkwolf indishell, Baba, Silent poison India, Magnum sniper, ethicalnoob Indishell, Local root indishell, Irfninja indishell Reborn India, L0rd Crus4d3r, cool toad, Hackuin, Alicks, Gujjar PCP, Bikash, Dinelson Amine, Th3 D3str0yer, SKSking, rad paul, Godzila, mike waals, zoo zoo, cyber warrior, shafoon, Rehan manzoor cyber gladiator,7he Cre4t0r, Cyber Ace, Golden boy INDIA, Ketan Singh, Yash, Aneesh Dogra, AR AR, saad abbasi, hero, Minhal Mehdi, Raj bhai ji, Hacking queen and rest of TEAM INDISHELL 89 | --==[[Love to]]==-- # My Father, my Ex Teacher, cold fire hacker, Mannu, ViKi, Ashu bhai ji, Soldier Of God, Bhuppi, Gujjar PCP, 90 | Mohit, Ffe, Ashish, Shardhanand, Budhaoo, Jagriti, Salty, Hacker fantastic, Jennifer Arcuri and Don(Deepika kaushik) 91 | 92 | 93 | |
34 | 35 | 36 | |
![]() | 58 | --==[[Greetz to]]==-- Zero cool, code breaker ica, root_devil, google_warrior, INX_r0ot, Darkwolf indishell, Baba, Silent poison India, Magnum sniper, ethicalnoob Indishell, Local root indishell, Irfninja indishell Reborn India, L0rd Crus4d3r, cool toad, Hackuin, Alicks, Gujjar PCP, Bikash, Dinelson Amine, Th3 D3str0yer, SKSking, rad paul, Godzila, mike waals, zoo zoo, cyber warrior, shafoon, Rehan manzoor cyber gladiator,7he Cre4t0r, Cyber Ace, Golden boy INDIA, Ketan Singh, Yash, Aneesh Dogra, AR AR, saad abbasi, hero, Minhal Mehdi, Raj bhai ji, Hacking queen and rest of TEAM INDISHELL 59 | --==[[Love to]]==-- # My Father, my Ex Teacher, cold fire hacker, Mannu, ViKi, Ashu bhai ji, Soldier Of God, Bhuppi, Gujjar PCP, 60 | Mohit, Ffe, Ashish, Shardhanand, Budhaoo, Jagriti, Salty, Hacker fantastic, Jennifer Arcuri and Don(Deepika kaushik) 61 | 62 | 63 | |
147 |
148 | #################################################################################################################################### 149 | --==[[ SSRF Vulnerable Lab]]==-- 150 | --==[[ With Love From Team IndiShell]]==-- 151 |
152 |
154 |
155 | #################################################################################################################################### | 156 | 158 | 159 | 160 | 161 | |
73 | 1. Application code fetch and disply the content of the specified file: - |
75 | --== Show Misconfiguration Info ==--
76 |
77 |
78 | |
Link to Vulnerable Script - file_get_content.php |
86 | 2. Application provide interface to connect to Remote Host : - |
88 | --== Show Misconfiguration Info ==--
89 |
90 |
91 |
98 | |
100 | Link to Vulnerable Script - sql_connect.php |
104 | 3. Application has File Download Functionality: - |
106 | --== Show Misconfiguration Info ==--
107 |
108 |
109 | |
Link to Vulnerable Script - download.php 115 | |
118 | 4. Bypassing IP blacklisting using DNS Based Spoofing: - |
120 | --== Show Misconfiguration Info ==--
121 |
122 |
123 | |
Link to Vulnerable Script - dns-spoofing.php |
132 | 5. Bypassing IP blacklisting using DNS Rebinding Technique: - |
134 | --== Show Misconfiguration Info ==--
135 |
136 |
137 | |
Link to Vulnerable Script - dns_rebinding.php |
146 | 6. SSRF in HTML to PDF generator: - |
148 | --== Show Misconfiguration Info ==--
149 |
150 |
151 |
152 | |
Link to Vulnerable Script 1 - pdf_ssrf_weasyprint.php Link to Vulnerable Script 2 - pdf_ssrf_wkhtmltopdf.php |
Invoice #123456789 | 210 |14 January 2025 211 | | ||
---|---|---|---|
214 | Pay to: 215 | Acme Billing Co. 216 | 123 Main St. 217 | Cityville, NA 12345 218 | |
219 |
220 | Customer: 221 | '.$data.' 222 | 321 Willow Way 223 | Southeast Northwestershire, MA 54321 224 | |
225 | ||
Name / Description | 230 |Qty. | 231 |@ | 232 |Cost | 233 |
Paperclips | 236 |1000 | 237 |0.01 | 238 |10.00 | 239 |
Staples (box) | 242 |100 | 243 |1.00 | 244 |100.00 | 245 |
Subtotal | 250 |110.00 | 251 |||
Tax | 254 |8% | 255 |8.80 | 256 ||
Grand Total | 259 |Rs. 118.80 | 260 |
127 | --==[[ WKHTMLtoPDF, HTML to PDF Converter Server-side request forgery ]]==-- 128 | --==[[ With Love From IndiShell Crew]]==-- 129 |
130 |
133 |
134 | #################################################################################################################################### | 135 | -==[[Greetz to]]==-- Zero cool, code breaker ica, r0ot_devil, google_warrior, INX_r0ot, Darkwolf indishell, Baba ,Silent poison India, Magnum sniper, 3thicalnoob Indishell, cyber warrior, Hacker Fantastic and rest of TEAM INDISHELL 136 | --==[[Love to]]==-- # My Father, my Ex Teacher, Lovey, cold fire hacker, Mannu, ViKi, Incredible, Hardeep Singh, Ashu bhai ji, Rafay Baloch, Soldier Of God, Shafoon, Rehan Manzoor, almas malik, Bhuppi, Mohit, Ffe ^_^, Govind Singh, Shardhanand, Budhaoo, Don(Deepika kaushik) and D3 137 | 138 | 139 | #################################################################################################################################### 140 | 141 | |
Invoice #123456789 | 210 |14 January 2025 211 | | ||
---|---|---|---|
214 | Pay to: 215 | Acme Billing Co. 216 | 123 Main St. 217 | Cityville, NA 12345 218 | |
219 |
220 | Customer: 221 | '.$data.' 222 | 321 Willow Way 223 | Southeast Northwestershire, MA 54321 224 | |
225 | ||
Name / Description | 230 |Qty. | 231 |@ | 232 |Cost | 233 |
Paperclips | 236 |1000 | 237 |0.01 | 238 |10.00 | 239 |
Staples (box) | 242 |100 | 243 |1.00 | 244 |100.00 | 245 |
Subtotal | 250 |110.00 | 251 |||
Tax | 254 |8% | 255 |8.80 | 256 ||
Grand Total | 259 |Rs. 118.80 | 260 |
36 |
37 | #################################################################################################################################### 38 | --==[[ XXE based SSRF Vulnerable Code ]]==-- 39 | --==[[ With Love From Team IndiShell]]==-- 40 |
41 |
43 |
44 | #################################################################################################################################### | 45 | 47 | 48 | 49 | 50 | |
69 | | 78 |
# | 97 |Name | 98 |Title | 99 |Devil Fruit | 100 |Power | 101 |
---|---|---|---|---|
".$serial." | 115 |".$title." | 116 |".$name." | 117 |".$fruit." | 118 |".$power." | 119 |