Member-only story

How to find SSRF, Bypass Cloudflare, and extract AWS metadata

Anonymous Traiger
3 min readDec 29, 2024

--

I was working on a program and since I have no permission to disclose the name of the target, let’s call it redacted.com.

after a little bit of working around this program, I came to an endpoint which was something like this ~> https://redacted.com/api/download-pdf?url=”http://SomeThing.com”.

I immediately fired up my burp collaborator and replaced the default URL with mine, fortunately, my burp collaborator received HTTP and DNS requests and I got the burp page in response.

After the first thing that came to my mind was, let’s put http://localhost there to get an interesting response!

but I got :

There was a protection for this one , but i didn’t give up and i went through all the way’s to bypass localhost restriction, I tried all of these payloads :

http://127.0.0.1:80
http://127.0.0.1:443
http://127.0.0.1:22
http://127.1:80
http://0
http://0.0.0.0:80
http://localhost:80…

--

--

No responses yet