Day 22

SSRF Jingle Your SSRF Bells: A Merry Command & Control Hackventure

Learning Objectives

  • Understanding server-side request forgery (SSRF)

  • Which different types of SSRF are used to exploit the vulnerability

  • Prerequisites for exploiting the vulnerability

  • How the attack works

  • How to exploit the vulnerability

  • Mitigation measures for protection

This room is again a very straightforward one with all commands and instructions already given. We just need to follow along and run them.

Is SSRF the process in which the attacker tricks the server into loading only external resources (yea/nay)? 
[REDACTED]
What is the C2 version?
[REDACTED]
What is the username for accessing the C2 panel?
[REDACTED]
What is the flag value after accessing the C2 panel?
[REDACTED]

This is shown upon logging in to the C2 panel.
What is the flag value after stopping the data exfiltration from the McSkidy computer?
[REDACTED]

This can be found after removing the correct agent.

Last updated

Was this helpful?