# ssrf-king **Repository Path**: delete_user/ssrf-king ## Basic Information - **Project Name**: ssrf-king - **Description**: SSRF plugin for burp Automates SSRF Detection in all of the Request - **Primary Language**: Unknown - **License**: MIT - **Default Branch**: main - **Homepage**: None - **GVP Project**: No ## Statistics - **Stars**: 1 - **Forks**: 0 - **Created**: 2021-01-24 - **Last Updated**: 2021-10-20 ## Categories & Tags **Categories**: Uncategorized **Tags**: None ## README # 🔥 ssrf-king 🔥 [![License: MIT](https://img.shields.io/badge/License-MIT-yellow.svg)](https://opensource.org/licenses/MIT) ### v1.12 Latest SSRF plugin for burp that Automates SSRF Detection in all of the Request ![alt text](https://image.flaticon.com/icons/png/128/1320/1320457.png) **If you are facing any problems or would like a new feature that is not listed below** **Please create a new issue below in this form** **[Create New Issue](https://github.com/ethicalhackingplayground/ssrf-king/issues/new)** ### Upcoming Features Checklist * ✔️ It will soon have a user Interface to specifiy your own call back payload * It will soon be able to test Json & XML ### Features * ✔️ Test all of the request for any external interactions. * ✔️ Checks to see if any interactions are not the users IP if it is, it's an open redirect. * ✔️ Alerts the user for any external interactions with information such as: - Endpoint Vulnerable - Host - Location Found It also performs the following tests based on this research: **Reference:** https://portswigger.net/research/cracking-the-lens-targeting-https-hidden-attack-surface ```http GET http://burpcollab/some/endpoint HTTP/1.1 Host: example.com ... ``` and ```http GET @burpcollab/some/endpoint HTTP/1.1 Host: example.com ... ``` and ```http GET /some/endpoint HTTP/1.1 Host: example.com:80@burpcollab ... ``` and ```http GET /some/endpoint HTTP/1.1 Host: burpcollab ... ``` and ```http GET /some/endpoint HTTP/1.1 Host: example.com X-Forwarded-Host: burpcollab ... ``` ### Scanning Options * ✔️ Supports Both Passive & Active Scanning. ### Example * Load the website you want to test. ![GitHub Logo](Pictures/ss-1.PNG) * Add it as an inscope host in burp. ![GitHub Logo](Pictures/ss-2.PNG) * Load the plugin. ![GitHub Logo](Pictures/ss-3.PNG) * Keep note of the Burp Collab Payload. ![GitHub Logo](Pictures/ss-4.PNG) * Passively crawl the page, ssrf-king test everything in the request on the fly. ![GitHub Logo](Pictures/ssf-5.PNG) * When it finds a vulnerabilitiy it logs the information and adds an alert. ![GitHub Logo](Pictures/ssrf-6.PNG) **From here onwards you would fuzz the parameter to test for SSRF.** ![GitHub Logo](Pictures/ssrf-7.PNG) ### Video Demonstration [![Alt Text](https://i9.ytimg.com/vi_webp/oIkPpgqKfsg/sddefault.webp?time=1610615700000&sqp=CJSXgIAG&rs=AOn4CLA9Ym3Tu3SVOVAk411OSO3f4_ljcA)](https://www.youtube.com/watch?v=oIkPpgqKfsg&t=26s&ab_channel=krypt0muxbugbounty) **If you get a bounty please support by buying me a coffee**
Buy Me A Coffee