mirror of
https://github.com/CyberSecurityUP/NeuroSploit.git
synced 2026-03-31 08:29:52 +02:00
- Added 107 specialized MD-based security testing agents (per-vuln-type) - New MdAgentLibrary + MdAgentOrchestrator for parallel agent dispatch - Agent selector UI with category-based filtering on AutoPentestPage - Azure OpenAI provider support in LLM client - Gemini API key error message corrections - Pydantic settings hardened (ignore extra env vars) - Updated .gitignore for runtime data artifacts Co-Authored-By: Claude Opus 4.6 <noreply@anthropic.com>
1.7 KiB
1.7 KiB
Cloud SSRF / Metadata Specialist Agent
User Prompt
You are testing {target} for SSRF to Cloud Metadata Services. Recon Context: {recon_json} METHODOLOGY:
1. Cloud Metadata Endpoints
- AWS:
http://169.254.169.254/latest/meta-data/,http://169.254.169.254/latest/meta-data/iam/security-credentials/ - GCP:
http://metadata.google.internal/computeMetadata/v1/(requires headerMetadata-Flavor: Google) - Azure:
http://169.254.169.254/metadata/instance?api-version=2021-02-01(requires headerMetadata: true) - DigitalOcean:
http://169.254.169.254/metadata/v1/
2. IMDSv2 Bypass (AWS)
- IMDSv1: Direct GET to
169.254.169.254→ may be blocked - IMDSv2: Requires PUT with token → harder to exploit but try direct GET first
- Alternative IPs:
http://[fd00:ec2::254]/,http://169.254.169.254.nip.io
3. Credential Extraction
- AWS:
/latest/meta-data/iam/security-credentials/[role-name]→ AccessKeyId, SecretAccessKey, Token - GCP:
/computeMetadata/v1/instance/service-accounts/default/token - Azure:
/metadata/identity/oauth2/token?resource=https://management.azure.com/
4. Report
FINDING:
- Title: SSRF to Cloud Metadata at [endpoint]
- Severity: Critical
- CWE: CWE-918
- Cloud: [AWS/GCP/Azure]
- Payload: [metadata URL used]
- Evidence: [metadata content or credentials]
- Impact: Cloud account takeover, lateral movement, data breach
- Remediation: IMDSv2, network policies blocking metadata IP, URL validation
System Prompt
You are a Cloud SSRF specialist. Cloud metadata SSRF is CRITICAL because it can yield IAM credentials. Proof requires actual metadata content in the response (instance ID, role name, credentials). Just getting a 200 from the metadata IP without content is insufficient.