swisskyrepo / SSRFmap

Automatic SSRF fuzzer and exploitation tool
MIT License
2.99k stars 521 forks source link

Verbose mode not working #33

Closed pdelteil closed 5 months ago

pdelteil commented 4 years ago

I would like to check the requests send to the target. I'm pretty sure I'm getting a lot of false positives.

The -v option doesn't do anything to the output of the command.

My command:

python3 ssrfmap.py -v -r data/request.txt -p url -m networkscan

The output is the same as running it without the -v flag.

Daimones81 commented 4 years ago

Hi, were you able to get it to work outside the local test server 127.0.0.1 (example.py)? With a burp request? I'm certainly wrong to enter the right parameter.

pdelteil commented 4 years ago

I did, but the results where not what I expected from the tool. It's nothing like sqlmap, that it's pretty straight forward to define the injection point

Daimones81 commented 4 years ago

Would you be kind enough to show an example? When I try outside the test server, it gives me all open ports if I do for example a portscan. What parameter do you use? You make the request with burp suite right? Thanks in advance