From 1c5360691b53763235180b4879a56c7b0ac9a74a Mon Sep 17 00:00:00 2001 From: Omar Santos Date: Mon, 3 Jul 2023 23:11:33 -0400 Subject: [PATCH] Update ssrf_galatic_archives.py --- web_application_testing/ssrf_galatic_archives.py | 5 ++--- 1 file changed, 2 insertions(+), 3 deletions(-) diff --git a/web_application_testing/ssrf_galatic_archives.py b/web_application_testing/ssrf_galatic_archives.py index 133c75a..2391d30 100644 --- a/web_application_testing/ssrf_galatic_archives.py +++ b/web_application_testing/ssrf_galatic_archives.py @@ -6,11 +6,10 @@ Author: Omar Santos @santosomar import requests # The URL of the vulnerable web service. -vulnerable_url = 'http://127.0.0.1:5000' +vulnerable_url = 'http://10.6.6.20:5000' # The internal URL that the attacker wants to access. -# AWS EC2 instances use this URL to provide instance metadata. -# This data should be inaccessible from outside the EC2 instance. +# This is to simulate that this data (secret.txt) should be inaccessible from attacker's network. internal_url = 'https://internal.secretcorp.org/secret.txt' # The attacker constructs the exploit URL by appending the internal URL