The Burp Suite User Forum was discontinued on the 1st November 2024.

Burp Suite User Forum

For support requests, go to the Support Center. To discuss with other Burp users, head to our Discord page.

SUPPORT CENTER DISCORD

Lab: Blind SSRF with Shellshock exploitation

Thoms | Last updated: Feb 23, 2021 02:40PM UTC

Hey everybody! So I resolved this lab with the help of the solution but I still didn't get every part of it. First, the Collaborator Everywhere Issues gives us which Information when they show "Collaborator Pingback (HTTP): Referer" and "Collaborator Pingback (HTTP): user-Agent"? It may explains that the lab site has visited the URL specified in the Referer header, but what about the user-agent issue? Then, how did we know that the server was on the 8080 port because I was looking for an address that looks like 192.168.0.X so I would have never found the internal server address!!!

Michelle, PortSwigger Agent | Last updated: Feb 25, 2021 10:38AM UTC