- Visit a product, click Check stock, intercept the request in Burp Suite, and send it to Burp Intruder.
-
Change the
stockApi
parameter tohttp://192.168.0.1:8080/admin
then highlight the final octet of the IP address (the number1
) and click Add ยง. - In the Payloads side panel, change the payload type to Numbers, and enter 1, 255, and 1 in the From and To and Step boxes respectively.
- Click Start attack.
-
Click on the Status column to sort it by status code ascending. You should see a single entry with a status of
200
, showing an admin interface. -
Click on this request, send it to Burp Repeater, and change the path in the
stockApi
to:/admin/delete?username=carlos
Lab: Basic SSRF against another back-end system
This lab has a stock check feature which fetches data from an internal system.
To solve the lab, use the stock check functionality to scan the internal 192.168.0.X
range for an admin interface on port
8080
, then use it to delete the user carlos
.