Table of Contents
Ssrf hunting approach example
1: Finding Requests containing Hostname, IP, Full URLs.
2: Modifying its value to Malicious Payload.
3: Analyzing Response.

1: Finding Requests containing Hostname, IP, Full URLs.
2: Modifying its value to Malicious Payload.
3: Analyzing Response.