Using Burp Suite Collaborator to determine SSRF
SSRF is a vulnerability that allows an attacker to force applications to make unauthorized requests on the attacker’s behalf. These requests can be as simple as DNS queries or as maniacal as commands from an attacker-controlled server.
In this recipe, we will use Burp Suite Collaborator to check open ports available for SSRF requests, and then we will use Burp Intruder to determine whether the application will perform DNS queries to the public Burp Suite Collaborator server through an SSRF vulnerability.
Getting ready
Log in to your PortSwigger account. Using PortSwigger Lab: Blind SSRF with out-of-band detection (https://portswigger.net/web-security/ssrf/blind/lab-out-of-band-detection), we will see how to use Burp Suite Collaborator to identify an SSRF vulnerability in our target application.
How to do it...
- Switch to the Burp Suite Collaborator tab. Click the Get started button: