-
Notifications
You must be signed in to change notification settings - Fork 69
Open
Labels
bugSomething isn't workingSomething isn't workingenhancementNew feature or requestNew feature or requesthelp wantedExtra attention is neededExtra attention is needed
Description
π Security Lab Enhancement : SSRF Bypass Challenge
Description
Currently, AspGoat includes one SSRF lab with both:
- β Vulnerable version
- β Secure version (with basic whitelist)
However, in real-world scenarios, attackers may find ways to bypass the secure code as well (e.g., via redirects, alternate encodings, or dns rebinding).
Tasks
- Analyze the current SSRF "secure" implementation via AspGoat UI (Login -> SSRF lab -> Identify Vulnerability -> Secure Code Modal).
- Copy the Secure Code and replace the Vulnerable Code with the Secure Code inside Controllers/HomeController.cs under SSRF POST ACTION
- Now try various methods to bypass this protection. (Note: Modifying the /etc/hosts file via RCE or manually to gain access to an internal ip address does not count π )
Reactions are currently unavailable
Metadata
Metadata
Assignees
Labels
bugSomething isn't workingSomething isn't workingenhancementNew feature or requestNew feature or requesthelp wantedExtra attention is neededExtra attention is needed