Chapter 5. Web Header Manipulation

In this chapter, we will cover the following topics:

  • Testing HTTP methods
  • Fingerprinting servers through HTTP headers
  • Testing for insecure headers
  • Brute forcing login through the Authorization header
  • Testing for clickjacking vulnerabilities
  • Identifying alternative sites by spoofing user agents
  • Testing for insecure cookie flags
  • Session fixation through a cookie injection

Introduction

A key area of penetration testing web servers is to focus in deep on the server's ability to handle requests and serve responses. If you're penetration testing a standard web server deployment, for example Apache or Nginx, then you will want to concentrate on breaking the configuration that's been deployed and enumerating/manipulating the content of the site. If it's a custom web server that you're penetration testing, then it's a good idea to have a copy of the HTTP RFC handy (available at http://tools.ietf.org/html/rfc7231) and to additionally test how the web server handles corrupted packets or unexpected requests.

This chapter will focus on creating recipes that manipulate requests in a way that should uncover the underlying web technologies and parse responses to highlight common issues or key areas for further testing.

..................Content has been hidden....................

You can't read the all page of ebook, please click here login for view all page.
Reset
3.129.194.106