webPromedium
WebhookForge
hackadvisor
Task: Webhook management platform with webhook tester (SSRF), open redirect via link tracking, and internal config service on port 3001. Solution: Chain 5+ tracking redirects to overflow the webhook tester's redirect limit, causing the error handler to leak the response body from the internal /config endpoint containing the flag.
$ ls tags/ techniques/
ssrfnodejsinformation_disclosurenginxexpressinternal_servicewebhookdecoy_flagopen_redirectredirect_chainlink_trackingerror_handling_leak
internal_service_enumerationresponse_body_exfiltrationssrf_via_redirect_chainopen_redirect_chainingredirect_limit_overflowerror_handler_information_disclosureport_scanning_via_ssrf
🔒
Permission denied (requires tier.pro)
Sign in to access full writeups
Sign in with GitHub to continue. No email required.
$sign in$ grep --similar
Similar writeups
- [web][Pro]PingForge— hackadvisor
- [web][Pro]Lab 205 — DockForge — SSRF in Webhook Test Endpoint— hackadvisor
- [web][Pro]Lab 6 — HookRelay — SSRF via IPv6-Mapped-IPv4 Bypass— hackadvisor
- [web][Pro]Lab 282 — StreamForge — SSRF via Webhook Test Bypasses Proxy Auth— hackadvisor
- [web][Pro]SendForge— hackadvisor