Open in app
Home
Notifications
Lists
Stories

Write
Muh. Fani Akbar
Muh. Fani Akbar

Home

Published in InfoSec Write-ups

·Feb 5

Server-Side Request Forgery to Internal SMTP Access

Introduction about SSRF attack can be read on separated medium post Beginner Guide To Exploit Server Side Request Forgery (SSRF) Vulnerability SSRF can be used to interact with SMTP, so attackers can send emails via SMTP servers from websites that are vulnerable to SSRF. Lab Setup git clone https://github.com/rhamaa/Web-Hacking-Lab.git cd Web-Hacking-Lab/SSRF_SMTP_LAB docker build -t…

Bug Bounty

4 min read

Server-Side Request Forgery to Internal SMTP Access
Server-Side Request Forgery to Internal SMTP Access

Feb 5

Server-Side Request Forgery to Internal SMTP Access — Indonesia

Untuk mengetahui basic dari SSRF bisa membaca Beginner Guide To Exploit Server Side Request Forgery (SSRF) Vulnerability — Indonesia SSRF bisa dimanfaatkan untuk berinteraksi dengan SMTP, sehingga attacker bisa mengirim email melalui server SMTP dari website yang vulnerable SSRF. Lab Setup Email Server menggunakan sendmail dan dideploy menggunakan docker. git clone https://github.com/rhamaa/Web-Hacking-Lab.git cd…

Bug Bounty

3 min read

Server-Side Request Forgery to Internal SMTP Access — Indonesia
Server-Side Request Forgery to Internal SMTP Access — Indonesia

Published in InfoSec Write-ups

·Oct 16, 2021

Exploiting Redis Through SSRF Attack

Redis is an in-memory data structure store that is used to store data in the form of key-values and can be used as a database, serialized/session storage, cache, and job queue. For example in Framework Django and Flask, Redis can be used as the session instance or in Gitlab using…

Exploitation

8 min read

Exploiting Redis Through SSRF Attack
Exploiting Redis Through SSRF Attack

Sep 7, 2021

Beginner Guide To Exploit Server Side Request Forgery (SSRF) Vulnerability — Indonesia

Service Side Request Forgery (SSRF) sederhana nya adalah serangan yang dimana server akan melakukan request untuk si attacker baik itu ke local ataupun ke remote source lalu mengembalikan response yang berisi data hasil dari request tersebut, pengertian dari SSRF hanya sesimple itu. Secara tidak langsung, konsep SSRF sama seperti penggunaan…

Hacking

5 min read

Beginner Guide To Exploit Server Side Request Forgery (SSRF) Vulnerability — Indonesia
Beginner Guide To Exploit Server Side Request Forgery (SSRF) Vulnerability — Indonesia

Published in InfoSec Write-ups

·Sep 6, 2021

Beginner Guide To Exploit Server Side Request Forgery (SSRF) Vulnerability

Server Side Request Forgery (SSRF) is simply an attack where the server will make a request (act like a proxy) for the attacker either to a local or to a remote source and then return a response containing the data resulting from the request. We can say that the concept…

Hacking

6 min read

Beginner Guide To Exploit Server Side Request Forgery (SSRF) Vulnerability
Beginner Guide To Exploit Server Side Request Forgery (SSRF) Vulnerability

Published in InfoSec Write-ups

·Sep 6, 2021

Exploiting XML External Entity (XXE) Injection Vulnerability

XML Entity 101‌ General Entity In simple words, Entity in XML can be said to be a variable, so this Entity can hold a value. Entities can be declared as Internal or External. Entity has 3 important parts, namely & , entity-nameand ;. …

Web Hacking

7 min read

Exploiting XML External Entity (XXE) Injection Vulnerability
Exploiting XML External Entity (XXE) Injection Vulnerability

Sep 6, 2021

Exploiting Broken Crypto to SSRF On PHP-Proxy

PHP-Proxy sebenarnya adalah project yang sudah tidak dikembangkan lagi, tapi disini saya melihat masih ada banyak orang yang menggunakan PHP-Proxy sebagai Web Proxy. Project PHP-Proxy https://www.php-proxy.com/ PHP-Proxy Overview Url yang disubmit di form, akan di-encrypt dan dilakukan redirect ke /?q=<ENCRYPTED_URL>.

Cybersecurity

3 min read

Exploiting Broken Crypto to SSRF On PHP-Proxy
Exploiting Broken Crypto to SSRF On PHP-Proxy

Jun 19, 2021

Offensive AWS — Attacking Identity and Access Management (IAM)

Pada saat awal mulai belajar AWS Security, saya pikir hal utama untuk dipelajari adalah berbagai macam services yang disediakan AWS tapi ternyata setelah saya memahami konsep Attack Vector yang ada di environment AWS itu mostly karena kesalahan permission yang dimana itu berhubungan dengan IAM, dan IAM adalah service AWS yang…

AWS

11 min read

Offensive AWS  — Attacking Identity and Access Management (IAM)
Offensive AWS  — Attacking Identity and Access Management (IAM)

Aug 12, 2020

My Top 5 Productivity CLI Tools

Untuk orang yang suka bekerja di-terminal/console pasti akan kesulitan atau merasa bosan apabila output atau bahkan fungsi yang ditawarkan command default bawaan. Oleh karena itu saya mempunyai 5 CLI Tools yang membuat saya semakin jatuh cinta untuk terus melihat terminal/console. Berikut 5 CLI Tools favorit saya : Pet Karena pekerjaan saya…

Terminal

3 min read

My Top 5 Productivity CLI Tools
My Top 5 Productivity CLI Tools
Muh. Fani Akbar

Muh. Fani Akbar

Application & Cloud Security | Software Developer | CEH

Following
  • Olaf Hartong

    Olaf Hartong

  • Gupta Bless

    Gupta Bless

  • Teri Radichel

    Teri Radichel

  • InfoSec Write-ups

    InfoSec Write-ups

  • Netflix Technology Blog

    Netflix Technology Blog

Help

Status

Writers

Blog

Careers

Privacy

Terms

About

Knowable