Skip to content

Commit 7a24f5d

Browse files
Update README.md
1 parent 196b6a5 commit 7a24f5d

File tree

1 file changed

+26
-0
lines changed

1 file changed

+26
-0
lines changed

Host_header/README.md

+26
Original file line numberDiff line numberDiff line change
@@ -1 +1,27 @@
11

2+
3+
4+
<h3>1. Install NGINX web server in Ubuntu machine:</h3>
5+
6+
apt-get install nginx
7+
8+
<h3>2. Replace the content of below mentioned file with this <a href="https://raw.githubusercontent.com/incredibleindishell/SSRF_Vulnerable_Lab/master/Host_header/default">NGINX web server Default file</a>:</h3>
9+
10+
11+
/etc/nginx/site-available/default
12+
13+
<img src="https://github.com/incredibleindishell/SSRF_Vulnerable_Lab/raw/master/Host_header/images/Nginx_config.png"/>
14+
15+
<h3>3. Reload NGINX web server using below mentioned command:</h3>
16+
17+
service nginx reload
18+
19+
<h3>4. Server-side request forgery exploitation:</h3>
20+
21+
In Burp suite, send request to repeater tab and click `Send` button:
22+
23+
<img src="https://raw.githubusercontent.com/incredibleindishell/SSRF_Vulnerable_Lab/master/Host_header/images/actual_request.png" />
24+
25+
Now, when we change the value of `Host` header with some other hostname/IP (192.168.56.104 in this case), web proxy server makes HTTP request to that host and returns HTTP response from that host:
26+
27+
<img src="https://raw.githubusercontent.com/incredibleindishell/SSRF_Vulnerable_Lab/master/Host_header/images/SSRF.png" />

0 commit comments

Comments
 (0)