SSRF - Protocol Smuggling Scanner
Tests SSRF with protocol smuggling techniques to bypass restrictions.
What is SSRF - Protocol Smuggling?
Protocol smuggling SSRF uses techniques to interact with non-HTTP services through HTTP-based SSRF vulnerabilities. By crafting special requests, attackers can communicate with services like Redis, Memcached, SMTP, or databases using gopher:// or other protocol handlers.
Why is This Important?
Protocol smuggling extends SSRF impact beyond HTTP services. Attackers can send commands to Redis (for RCE via cron jobs), interact with SMTP (send emails), or communicate with any TCP service, greatly expanding the attack surface.
How It Works
1. Web Crawling
Intelligent crawling discovers all endpoints, forms, parameters, and dynamic content across your web application.
2. Payload Injection
AI-powered payloads test each input vector for web vulnerabilities with context-aware attack patterns.
3. Response Analysis
Advanced analysis detects vulnerability signatures in responses, confirming exploitability with proof-of-concept.
Key Capabilities
Industry-leading web security testing powered by AI, trusted by security teams worldwide for accurate vulnerability detection.
- Deep web crawling with JavaScript rendering support
- Context-aware payload generation for each parameter
- False positive elimination through response analysis
- OWASP Top 10 and CWE compliance mapping
- Seamless CI/CD and DevSecOps integration
Frequently Asked Questions
What is the gopher protocol?
Gopher is an old protocol that allows arbitrary TCP data transmission. In SSRF, gopher:// URLs can send raw bytes to any port, enabling interaction with non-HTTP services.
How is Redis exploited via SSRF?
Using gopher://, attackers send Redis commands to write a cron job or SSH key, achieving code execution on systems where Redis runs as root or a privileged user.
Which protocols are commonly smuggled?
Redis, Memcached, SMTP, MySQL, PostgreSQL, FastCGI, and any service accepting plaintext commands over TCP.
Do SSRF filters block protocol smuggling?
Basic URL filters often only check HTTP/HTTPS. Proper protection requires blocking all unnecessary URL schemes and validating the entire URL structure.
Related Scanners
Ready to secure your application?
Start testing for ssrf - protocol smuggling vulnerabilities today.
Get Started Free