Back to Browse

SSRF Lab: Blind SSRF with Shellshock exploitation

23 views
Apr 26, 2026
2:29

awesome bssrf lab This site uses analytics software which fetches the URL specified in the Referer header when a product page is loaded. To solve the lab, use this functionality to perform a blind SSRF attack against an internal server in the 192.168.0.X range on port 8080. In the blind attack, use a Shellshock payload against the internal server to exfiltrate the name of the OS user.

Download

1 formats

Video Formats

360pmp42.6 MB

Right-click 'Download' and select 'Save Link As' if the file opens in a new tab.

SSRF Lab: Blind SSRF with Shellshock exploitation | NatokHD