Closed pdelteil closed 5 months ago
Hi, were you able to get it to work outside the local test server 127.0.0.1 (example.py)? With a burp request? I'm certainly wrong to enter the right parameter.
I did, but the results where not what I expected from the tool. It's nothing like sqlmap, that it's pretty straight forward to define the injection point
Would you be kind enough to show an example? When I try outside the test server, it gives me all open ports if I do for example a portscan. What parameter do you use? You make the request with burp suite right? Thanks in advance
I would like to check the requests send to the target. I'm pretty sure I'm getting a lot of false positives.
The -v option doesn't do anything to the output of the command.
My command:
python3 ssrfmap.py -v -r data/request.txt -p url -m networkscan
The output is the same as running it without the -v flag.