Skip to content
/ mahost Public

Check for Host-Header SSRF Attack on a single or multiple hosts

License

Notifications You must be signed in to change notification settings

abundov/mahost

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

27 Commits
 
 
 
 
 
 
 
 

Repository files navigation

MaHost-single and MaHost-mass v1.0

Check for Host-Header SSRF Attack on a single or multiple hosts
Please check mahost-single.sh and mahost-mass.sh for instructions on running the scripts

Let's say you wanted to check if a certain host (some.domain.com) is susceptible to Host Header SSRF attack, and you wanted to use Burp Collaborator (or a service like 'requestbin.com') and Curl. Here is a solution! Keep in mind it's very basic, and it gets straight to the point so we begin testing and get results.




>>For a single host, enter "./mahost-single.sh" and follow the prompt (Enter Host-to-Scan and Burp Collaborator URL)






>>For multiple hosts, first create a list of subdomains in format: (https://some.domain.com - one per line) and save it to a file (list.txt)

Now run the command "./mahost-mass.sh" and follow the prompt (Enter list file [eg. list.txt] and then your Burp Collaborator URL)





Disclaimer: Please use this program ethically and follow all applicable laws. It is made to help companies secure their web applications, and I take no responsibility for what you do with it.

MaHost is licensed under the GNU GPL license.

About

Check for Host-Header SSRF Attack on a single or multiple hosts

Resources

License

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published

Languages