SSRFmap icon indicating copy to clipboard operation
SSRFmap copied to clipboard

Verbose mode not working

Open pdelteil opened this issue 3 years ago • 3 comments

I would like to check the requests send to the target. I'm pretty sure I'm getting a lot of false positives.

The -v option doesn't do anything to the output of the command.

My command:

python3 ssrfmap.py -v -r data/request.txt -p url -m networkscan

The output is the same as running it without the -v flag.

pdelteil avatar Oct 02 '20 22:10 pdelteil

Hi, were you able to get it to work outside the local test server 127.0.0.1 (example.py)? With a burp request? I'm certainly wrong to enter the right parameter.

Daimones81 avatar Oct 03 '20 10:10 Daimones81

I did, but the results where not what I expected from the tool. It's nothing like sqlmap, that it's pretty straight forward to define the injection point

pdelteil avatar Oct 05 '20 01:10 pdelteil

Would you be kind enough to show an example? When I try outside the test server, it gives me all open ports if I do for example a portscan. What parameter do you use? You make the request with burp suite right? Thanks in advance

Daimones81 avatar Oct 05 '20 08:10 Daimones81