-
-
Notifications
You must be signed in to change notification settings - Fork 494
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Verbose mode not working #33
Comments
Hi, were you able to get it to work outside the local test server 127.0.0.1 (example.py)? With a burp request? I'm certainly wrong to enter the right parameter. |
I did, but the results where not what I expected from the tool. It's nothing like sqlmap, that it's pretty straight forward to define the injection point |
Would you be kind enough to show an example? When I try outside the test server, it gives me all open ports if I do for example a portscan. What parameter do you use? You make the request with burp suite right? Thanks in advance |
I would like to check the requests send to the target. I'm pretty sure I'm getting a lot of false positives.
The -v option doesn't do anything to the output of the command.
My command:
python3 ssrfmap.py -v -r data/request.txt -p url -m networkscan
The output is the same as running it without the -v flag.
The text was updated successfully, but these errors were encountered: