In this tutorial, you will learn how to manually use Burp Collaborator. You will test whether you can induce a target site to make a request to an arbitrary server that could potentially be controlled by an attacker.
Step 1: Access the lab
Open Burp's browser, and use it to access the following URL:
ClickAccess the laband log in to your PortSwigger account if prompted. This opens your own instance of a deliberately vulnerable shopping website.
Step 2: Browse the target site
In the browser, explore the site by clicking on a couple of the product pages.
Step 3: Send an interesting request to Repeater
In Burp, go to theProxy > HTTP historytab.
Right-click aGET /product?productId=[...]request and selectSend to Repeater.
Step 4: Inject a Collaborator payload into the request
Go to theRepeatertab. Highlight the URL in theRefererheader, right-click, and selectInsert Collaborator payload. This replaces theRefererURL with a URL that points to the Collaborator server, for example:
204119i326shak9tnk6k36z8jlahj74r.oastify.com
Send the request.
Note
The Collaborator server domain name may change, as we periodically add new domain names. For more information, seeGenerating payloads.
Step 5: Poll for interactions
Go to theCollaboratortab. Collaborator polls for interactions every 60 seconds, so you may see some interactions listed already. If not, clickPoll now. Interactions received as a result of your Collaborator payloads are displayed. This confirms that the target site made a request to the arbitrary server.
In this case, you see both HTTP and DNS interactions. Click on an interaction to view more details.
Summary
Congratulations, you have now successfully:
Generated a Collaborator payload.
Inserted a Collaborator payload in a request.
Induced the application to send a request to your Collaborator subdomain, and identified this by polling the server for interactions.
You now know how to use Burp Collaborator to manually generate a proof of concept for invisible vulnerabilities, in this case, blind SSRF.
What next?
This tutorial is just an initial proof of concept. To learn how you can exploit this kind of behavior in the wild, check out theWeb Security Academy, in particular: