Burp Suite User Forum

Create new post

Lab: SSRF via flawed request parsing

JDRanpariya | Last updated: Oct 08, 2020 06:01AM UTC

I have hard time doing brute forcing 198.168.0.0/24 in burp I tried using cluster bomb and the number of requests I needed to sent was 65K+ is there a way to solve the challenge without brute forcing that. Regards, JDRanpariya

Hannah, PortSwigger Agent | Last updated: Oct 08, 2020 06:55AM UTC

Hi For this lab, you should only have 256 payloads in Intruder. Have you completed the previous labs in this topic?

You must be an existing, logged-in customer to reply to a thread. Please email us for additional support.