Back to Browse

Routing-based SSRF - Lab#04

676 views
May 14, 2025
9:55

In this video, we exploit a routing-based Server-Side Request Forgery (SSRF) vulnerability through manipulation of the Host header and demonstrates how improper request routing can grant access to internal resources. 🔍 What You’ll Learn: How routing-based SSRF differs from classic SSRF How to manipulate the Host header to reach internal systems Accessing internal admin panels behind private IP ranges Deleting users via unauthorized internal access 📌 Lab Goal: Exploit SSRF to access an internal admin panel at 192.168.0.x, then delete the user carlos. 🔒 Security Concepts: SSRF, Host header injection, internal network exploitation, IP-based routing ⚠️ Warning: These techniques should only be used in legally authorized environments for ethical and educational purposes. #SSRF #HostHeaderInjection #PortSwigger #WebSecurity #EthicalHacking #CyberSecurity #WebSecurityAcademy #BugBounty #BurpSuite #InternalNetworkAccess #InfoSec #CTF #IntranetHacking

Download

0 formats

No download links available.

Routing-based SSRF - Lab#04 | NatokHD