Use this sheet when the target is blind:
- blind SSRF
- blind XSS
- blind RCE / deserialization
- background webhooks
- API calls you want to inspect quickly
This complements your main web + Burp sheets.
It focuses on external helpers, not vuln theory.
1. Generate a unique marker
2. Pick webhook.site or interactsh
3. Inject callback URL in parameter / header / HTML
4. Poll logs
5. If hit appears:
- confirm source
- inspect method / headers / body
- escalate payload
6. Save payload and marker in notes
02OOB / Callback
webhook.site
Use for
- fast HTTP callbacks
- full request body / headers
- manual testing and replay
Exampleshttps://webhook.site/<id>https://webhook.site/<id>?tag=ssrf1https://webhook.site/<id>/x.js
interactsh
Use for
- DNS proof
- HTTP proof
- SMTP callbacks
- CLI / automation
Runinteractsh-clientinteractsh-client -jsoninteractsh-client -o interactions.json
Typical payloadhttp://<id>.oast.site
Check:
- old JS bundles
- deprecated endpoints
- old login / admin paths
- robots.txt history
- docs accidentally published then removed
07Decision Tree
Pick the right helper fast
Need full HTTP request details now?
→ webhook.siteNeed DNS / SMTP OOB or CLI automation?
→ interactshNeed blind XSS victim metadata?
→ XSS Hunter style serviceNeed to inspect what your script sends?
→ httpbinNeed SSRF allowlist / host validation tricks?
→ nip.io / sslip.ioNeed forgotten endpoints or subdomains?
→ Wayback / crt.sh
Rule Start with webhook.site for human-readable HTTP debugging; switch to interactsh when you suspect the server only makes DNS or background OOB requests.