Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Verbose mode not working #33

Closed
pdelteil opened this issue Oct 2, 2020 · 3 comments
Closed

Verbose mode not working #33

pdelteil opened this issue Oct 2, 2020 · 3 comments

Comments

@pdelteil
Copy link

pdelteil commented Oct 2, 2020

I would like to check the requests send to the target. I'm pretty sure I'm getting a lot of false positives.

The -v option doesn't do anything to the output of the command.

My command:

python3 ssrfmap.py -v -r data/request.txt -p url -m networkscan

The output is the same as running it without the -v flag.

@Daimones81
Copy link

Hi, were you able to get it to work outside the local test server 127.0.0.1 (example.py)? With a burp request? I'm certainly wrong to enter the right parameter.

@pdelteil
Copy link
Author

pdelteil commented Oct 5, 2020

I did, but the results where not what I expected from the tool. It's nothing like sqlmap, that it's pretty straight forward to define the injection point

@Daimones81
Copy link

Would you be kind enough to show an example? When I try outside the test server, it gives me all open ports if I do for example a portscan. What parameter do you use? You make the request with burp suite right? Thanks in advance

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

No branches or pull requests

3 participants