If there is an SSRF issue and if target is restricted to do internal ip scanning then you can use dns rebinding to bypass the restrictions. Even if they restricted aws metadata ip address also you can bypass it using dns rebinding.
Bro it would be helpful if you increase the volume in the video. Someone surfing TH-cam over mobile for good cybersecurity content would easily bypass this video b/c even at full volume I am not able to listen it.
In this bypass no need to change company settings, just bind two ip addresses(one is not restricted ip address like google ip and other is restricted ip address like localhost) for the same domain and pass the domain as a user input. For binding two ips to same domain you can use the dns rebinder service that i shown in the video.
if you want to support my work:
www.buymeacoffee.com/devsechacker
I appreciate this video! Great work!
Thank you. It pays off all the time that I spent.
Excellent .. Bro .mastu chepinav
Thank you. Do subscribe and you will get more content.
Never commented on any video love the way you told 😮🎉
Thank you. Then do support by subscribing.
Great explanation
Thanks and please do support by subscribing to my channel for more videos like these.
I’ve found this when I ran nuclei on my target and didn’t know the exploit. So it is necessary to find ssrf first to chain with dns rebinding?
If there is an SSRF issue and if target is restricted to do internal ip scanning then you can use dns rebinding to bypass the restrictions. Even if they restricted aws metadata ip address also you can bypass it using dns rebinding.
@@DevSecHacker nuclei shows dns rebinding and the severity was high but I didn’t find ssrf yet.
What template did you used for this?
Thanks mate!
you are welcome.
Bro it would be helpful if you increase the volume in the video.
Someone surfing TH-cam over mobile for good cybersecurity content would easily bypass this video b/c even at full volume I am not able to listen it.
Yeah....It was an old video and I changed the volume settings in later/recent videos.
Ok but how can a attacker change dns settings of a company make make local host point to some other ip ?? Please help 🙏
In this bypass no need to change company settings, just bind two ip addresses(one is not restricted ip address like google ip and other is restricted ip address like localhost) for the same domain and pass the domain as a user input. For binding two ips to same domain you can use the dns rebinder service that i shown in the video.
@@DevSecHacker ok thanks 🙏
can i get src code pls
github.com/RajuGanapathiraju/VulnerableLabs/blob/main/ssrf_bypass.js