SlideShare a Scribd company logo
Why HTTP Testing?
The HTTP methods can be used or nefarious purposes if the web server is mis-cofigured. Additionally
Cross Site Tracing (XST), a form of cross site scripting using the server’s HTTP TRACE method, is used by
attackers to get the credentials of authenticated users.
Other HTTP Methods are:HEAD
GET
POST
PUT
DELETE
TRACE
OPTIONS
CONNECT
Other Arbitrary Methods are = FOOBAR JEFF CATS etc.
HG PPD OC
HEAD Get POST PUT Delete Options Connect
Some of these methods can pose a security risk for the application as they allow an attacker to modify
the files stored on the web server and in some scenarios steal the credentials of legitimate users.
PUT = This method allows a client to upload new files on the web server. An attacker can exploit it by
uploading malicious files. (E.g an asp file that invokes cmd.exe or by simply using the victim’s server as a
file repository)
DELETE = This method allows a client to delete a file on the web server. An attacker can exploit it as a
simple and direct way to deface a web site or to mount a DoS attack.
CONNECT = This method could allow a client to use a web server as a proxy.
TRACE = This method simply echoes back to the client whatever string has been sent to the server and is
used mainly for debugging purposes. This is used to mount an attack known as Cross Site Tracing which
had been discovered by Jeremiah Grossman
If an application needs one or more of these methods, such as REST Web services (which may require
PUT or DELETE) it is important to check that their usage is properly limited to trusted users and safe
conditions.
Many frameworks and languages treat HEAD as a GET request without any body in response. If only
authenticated users are allowed or a particular servlet or resource then it would be bypassed for the
HEAD.
Some other framework allowed arbitrary HTTP methods such as “JEFF” and CATS to be used without
limitation. They were treated as if a GET method was issued.
So there is a need for the code to explicitly check for a GET or POST method.
Black Box Testing of HTTP Methods

The OPTIONS HTTP method provides us with the most direct and effective way to do that. OPTIONS
method requests for information about the communication options available on the request/resonse
chain identified by the Request-URL.
The testing method is extremely straightforward and we only need to fire up netcat or telnet

TRACE method is used to bypass the HTTPOnly tag which forbids the javascript to access it but the
TRACE method is used to bypass this protection and access the cookie. This is called Cross Site Scripting.
The attacker controlled web server gets the document cookie object for hijacking the victim’ session;
When we issue the TRACE command using telnet we get the copy of the commands issued in the end.
This means that by using this an attacker can get information of cookie and then use java script though it
is tagged as HTTPOnly
TESTING FOR ARBRITARY HTTP METHODS

Check whether the server accepts JEFF or not. If there is no issue of 405 not allowed or 501 not
implemented error page then there is vulnerability.
Try one of the following to exploit fully
FOOBAR /admin/createUser.php?member=myAdmin
JEFF /admin/changePw.php?member=myAdmin&passwd=foo123&confirm=foo123
CATS /admin/groupEdit.php?group=Admins&member=myAdmin&action=add
With little luck by using the above combination we can create a new user and password can be assigned
and made an admin.

Testing or HEAD access control bypass

Try url of a page that forces redirection to login and test this URL for HEAD request and see the
response. If 302 is directed, then it is safe. If we get a 200 response then it is easy to bypass the
authentication and thus authorization. If a 200 response code comes back and the response contains no
body then it is likely that the application has processed the request without authentication and urther
testing is warranted.

More Related Content

What's hot (20)

PDF
ATT&CK Updates- Campaigns
MITRE ATT&CK
 
PDF
ClickHouse Defense Against the Dark Arts - Intro to Security and Privacy
Altinity Ltd
 
PDF
Tidying up your Nest: Validating ATT&CK Technique Coverage using EDR Telemetry
MITRE ATT&CK
 
PPTX
Active directory domain service
Festus Oriaku
 
PDF
How to prevent ssh-tunneling using Palo Alto Networks NGFW
Yudi Arijanto
 
PPT
Sql injection attack
RajKumar Rampelli
 
PDF
Ethical Hacking
Jakub Ruzicka
 
PDF
What's So Special about the Oracle Database Appliance?
O-box
 
PPTX
Six Degrees of Domain Admin - BloodHound at DEF CON 24
Andy Robbins
 
PDF
Satellite Hacking — Intro by Indianz (2012)
Jim Geovedi
 
PDF
ATT&CK Updates- ATT&CK's Open Source
MITRE ATT&CK
 
PDF
Mapping to MITRE ATT&CK: Enhancing Operations Through the Tracking of Interac...
MITRE ATT&CK
 
PDF
ATT&CKing the Red/Blue Divide
MITRE ATT&CK
 
PDF
Grow Up! Evaluating and Maturing Your SOC using MITRE ATT&CK
MITRE ATT&CK
 
PPTX
Exploitation techniques and fuzzing
Prachi Gulihar
 
PDF
Bringing Kafka Without Zookeeper Into Production with Colin McCabe | Kafka Su...
HostedbyConfluent
 
PDF
HTTP Parameter Pollution Vulnerabilities in Web Applications (Black Hat EU 2011)
Marco Balduzzi
 
PDF
Intelligence Failures of Lincolns Top Spies: What CTI Analysts Can Learn Fro...
MITRE ATT&CK
 
PDF
ATT&CK Updates- ATT&CK for ICS
MITRE ATT&CK
 
ATT&CK Updates- Campaigns
MITRE ATT&CK
 
ClickHouse Defense Against the Dark Arts - Intro to Security and Privacy
Altinity Ltd
 
Tidying up your Nest: Validating ATT&CK Technique Coverage using EDR Telemetry
MITRE ATT&CK
 
Active directory domain service
Festus Oriaku
 
How to prevent ssh-tunneling using Palo Alto Networks NGFW
Yudi Arijanto
 
Sql injection attack
RajKumar Rampelli
 
Ethical Hacking
Jakub Ruzicka
 
What's So Special about the Oracle Database Appliance?
O-box
 
Six Degrees of Domain Admin - BloodHound at DEF CON 24
Andy Robbins
 
Satellite Hacking — Intro by Indianz (2012)
Jim Geovedi
 
ATT&CK Updates- ATT&CK's Open Source
MITRE ATT&CK
 
Mapping to MITRE ATT&CK: Enhancing Operations Through the Tracking of Interac...
MITRE ATT&CK
 
ATT&CKing the Red/Blue Divide
MITRE ATT&CK
 
Grow Up! Evaluating and Maturing Your SOC using MITRE ATT&CK
MITRE ATT&CK
 
Exploitation techniques and fuzzing
Prachi Gulihar
 
Bringing Kafka Without Zookeeper Into Production with Colin McCabe | Kafka Su...
HostedbyConfluent
 
HTTP Parameter Pollution Vulnerabilities in Web Applications (Black Hat EU 2011)
Marco Balduzzi
 
Intelligence Failures of Lincolns Top Spies: What CTI Analysts Can Learn Fro...
MITRE ATT&CK
 
ATT&CK Updates- ATT&CK for ICS
MITRE ATT&CK
 

Similar to Testing http methods using Telnet (20)

PDF
White paper screen
eltincho89
 
PPTX
Lesson 6 web based attacks
Frank Victory
 
PDF
XST - Cross Site Tracing
Magno Logan
 
PDF
The 3 Top Techniques for Web Security Testing Using a Proxy
TEST Huddle
 
PDF
Web technology-guide
Srihari
 
PPT
Identifying Web Servers: A First-look Into the Future of Web Server Fingerpri...
Jeremiah Grossman
 
PDF
Ch 3: Web Application Technologies
Sam Bowne
 
PDF
HTTP Request and Response Structure
BhagyashreeGajera1
 
PDF
CNIT 129S - Ch 3: Web Application Technologies
Sam Bowne
 
PDF
CNIT 129S: Ch 3: Web Application Technologies
Sam Bowne
 
PPT
Pentesting web applications
Satish b
 
PDF
SOHOpelessly Broken
The Security of Things Forum
 
PPTX
Web application vulnerability assessment
Ravikumar Paghdal
 
DOCX
Study of http
Dhairya Joshi
 
PPTX
10_Web Security.pptx
FernandoVizer
 
PDF
Romulus OWASP
Grupo Gesfor I+D+i
 
PDF
HTTP Basics Demo
InMobi Technology
 
PPTX
01. http basics v27
Eoin Keary
 
PDF
Webappcontrol for Information Technology
tiwariparivaar24
 
White paper screen
eltincho89
 
Lesson 6 web based attacks
Frank Victory
 
XST - Cross Site Tracing
Magno Logan
 
The 3 Top Techniques for Web Security Testing Using a Proxy
TEST Huddle
 
Web technology-guide
Srihari
 
Identifying Web Servers: A First-look Into the Future of Web Server Fingerpri...
Jeremiah Grossman
 
Ch 3: Web Application Technologies
Sam Bowne
 
HTTP Request and Response Structure
BhagyashreeGajera1
 
CNIT 129S - Ch 3: Web Application Technologies
Sam Bowne
 
CNIT 129S: Ch 3: Web Application Technologies
Sam Bowne
 
Pentesting web applications
Satish b
 
SOHOpelessly Broken
The Security of Things Forum
 
Web application vulnerability assessment
Ravikumar Paghdal
 
Study of http
Dhairya Joshi
 
10_Web Security.pptx
FernandoVizer
 
Romulus OWASP
Grupo Gesfor I+D+i
 
HTTP Basics Demo
InMobi Technology
 
01. http basics v27
Eoin Keary
 
Webappcontrol for Information Technology
tiwariparivaar24
 
Ad

More from Sunil Kumar Gunasekaran (20)

DOCX
CQL - Cassandra commands Notes
Sunil Kumar Gunasekaran
 
DOCX
Java J2EE Complete Syllabus Checklist
Sunil Kumar Gunasekaran
 
PDF
Amazon search test case document
Sunil Kumar Gunasekaran
 
DOC
Actual test case document
Sunil Kumar Gunasekaran
 
DOC
Sample Technical Requirement Document (TRD)
Sunil Kumar Gunasekaran
 
DOCX
Sql reference from w3 schools
Sunil Kumar Gunasekaran
 
DOCX
Sql commands worked out in sql plus with screen shots
Sunil Kumar Gunasekaran
 
DOCX
Wells fargo banking system ER Diagram
Sunil Kumar Gunasekaran
 
DOC
Business Requirements Document for Acounts Payable System
Sunil Kumar Gunasekaran
 
DOCX
Automation Testing Syllabus - Checklist
Sunil Kumar Gunasekaran
 
DOCX
Unix made easy
Sunil Kumar Gunasekaran
 
PDF
Test process - Important Concepts
Sunil Kumar Gunasekaran
 
PDF
Test Life Cycle - Presentation - Important concepts covered
Sunil Kumar Gunasekaran
 
DOCX
Scrum writeup - Agile
Sunil Kumar Gunasekaran
 
DOCX
Scrum, V Model and RUP Models Overview
Sunil Kumar Gunasekaran
 
DOCX
PERL for QA - Important Commands and applications
Sunil Kumar Gunasekaran
 
DOCX
JAVA Notes - All major concepts covered with examples
Sunil Kumar Gunasekaran
 
DOCX
Java programs - bubble sort, iterator, linked list, hash set, reverse string,...
Sunil Kumar Gunasekaran
 
DOCX
Fitnesse user acceptance test - Presentation
Sunil Kumar Gunasekaran
 
CQL - Cassandra commands Notes
Sunil Kumar Gunasekaran
 
Java J2EE Complete Syllabus Checklist
Sunil Kumar Gunasekaran
 
Amazon search test case document
Sunil Kumar Gunasekaran
 
Actual test case document
Sunil Kumar Gunasekaran
 
Sample Technical Requirement Document (TRD)
Sunil Kumar Gunasekaran
 
Sql reference from w3 schools
Sunil Kumar Gunasekaran
 
Sql commands worked out in sql plus with screen shots
Sunil Kumar Gunasekaran
 
Wells fargo banking system ER Diagram
Sunil Kumar Gunasekaran
 
Business Requirements Document for Acounts Payable System
Sunil Kumar Gunasekaran
 
Automation Testing Syllabus - Checklist
Sunil Kumar Gunasekaran
 
Unix made easy
Sunil Kumar Gunasekaran
 
Test process - Important Concepts
Sunil Kumar Gunasekaran
 
Test Life Cycle - Presentation - Important concepts covered
Sunil Kumar Gunasekaran
 
Scrum writeup - Agile
Sunil Kumar Gunasekaran
 
Scrum, V Model and RUP Models Overview
Sunil Kumar Gunasekaran
 
PERL for QA - Important Commands and applications
Sunil Kumar Gunasekaran
 
JAVA Notes - All major concepts covered with examples
Sunil Kumar Gunasekaran
 
Java programs - bubble sort, iterator, linked list, hash set, reverse string,...
Sunil Kumar Gunasekaran
 
Fitnesse user acceptance test - Presentation
Sunil Kumar Gunasekaran
 
Ad

Recently uploaded (20)

PDF
community health nursing question paper 2.pdf
Prince kumar
 
PDF
Dimensions of Societal Planning in Commonism
StefanMz
 
PPTX
BANDHA (BANDAGES) PPT.pptx ayurveda shalya tantra
rakhan78619
 
PPTX
Pyhton with Mysql to perform CRUD operations.pptx
Ramakrishna Reddy Bijjam
 
PDF
LAW OF CONTRACT ( 5 YEAR LLB & UNITARY LLB)- MODULE-3 - LEARN THROUGH PICTURE
APARNA T SHAIL KUMAR
 
PPTX
How to Create Rental Orders in Odoo 18 Rental
Celine George
 
PPTX
PPT on the Development of Education in the Victorian England
Beena E S
 
PPTX
How to Set Maximum Difference Odoo 18 POS
Celine George
 
PPSX
Health Planning in india - Unit 03 - CHN 2 - GNM 3RD YEAR.ppsx
Priyanshu Anand
 
PDF
People & Earth's Ecosystem -Lesson 2: People & Population
marvinnbustamante1
 
PDF
Federal dollars withheld by district, charter, grant recipient
Mebane Rash
 
PDF
CHILD RIGHTS AND PROTECTION QUESTION BANK
Dr Raja Mohammed T
 
PPTX
Unit 2 COMMERCIAL BANKING, Corporate banking.pptx
AnubalaSuresh1
 
PPTX
How to Manage Large Scrollbar in Odoo 18 POS
Celine George
 
PPTX
Views on Education of Indian Thinkers Mahatma Gandhi.pptx
ShrutiMahanta1
 
PPTX
How to Manage Access Rights & User Types in Odoo 18
Celine George
 
PDF
ARAL_Orientation_Day-2-Sessions_ARAL-Readung ARAL-Mathematics ARAL-Sciencev2.pdf
JoelVilloso1
 
PDF
DIGESTION OF CARBOHYDRATES,PROTEINS,LIPIDS
raviralanaresh2
 
PPTX
How to Manage Promotions in Odoo 18 Sales
Celine George
 
PDF
'' IMPORTANCE OF EXCLUSIVE BREAST FEEDING ''
SHAHEEN SHAIKH
 
community health nursing question paper 2.pdf
Prince kumar
 
Dimensions of Societal Planning in Commonism
StefanMz
 
BANDHA (BANDAGES) PPT.pptx ayurveda shalya tantra
rakhan78619
 
Pyhton with Mysql to perform CRUD operations.pptx
Ramakrishna Reddy Bijjam
 
LAW OF CONTRACT ( 5 YEAR LLB & UNITARY LLB)- MODULE-3 - LEARN THROUGH PICTURE
APARNA T SHAIL KUMAR
 
How to Create Rental Orders in Odoo 18 Rental
Celine George
 
PPT on the Development of Education in the Victorian England
Beena E S
 
How to Set Maximum Difference Odoo 18 POS
Celine George
 
Health Planning in india - Unit 03 - CHN 2 - GNM 3RD YEAR.ppsx
Priyanshu Anand
 
People & Earth's Ecosystem -Lesson 2: People & Population
marvinnbustamante1
 
Federal dollars withheld by district, charter, grant recipient
Mebane Rash
 
CHILD RIGHTS AND PROTECTION QUESTION BANK
Dr Raja Mohammed T
 
Unit 2 COMMERCIAL BANKING, Corporate banking.pptx
AnubalaSuresh1
 
How to Manage Large Scrollbar in Odoo 18 POS
Celine George
 
Views on Education of Indian Thinkers Mahatma Gandhi.pptx
ShrutiMahanta1
 
How to Manage Access Rights & User Types in Odoo 18
Celine George
 
ARAL_Orientation_Day-2-Sessions_ARAL-Readung ARAL-Mathematics ARAL-Sciencev2.pdf
JoelVilloso1
 
DIGESTION OF CARBOHYDRATES,PROTEINS,LIPIDS
raviralanaresh2
 
How to Manage Promotions in Odoo 18 Sales
Celine George
 
'' IMPORTANCE OF EXCLUSIVE BREAST FEEDING ''
SHAHEEN SHAIKH
 

Testing http methods using Telnet

  • 1. Why HTTP Testing? The HTTP methods can be used or nefarious purposes if the web server is mis-cofigured. Additionally Cross Site Tracing (XST), a form of cross site scripting using the server’s HTTP TRACE method, is used by attackers to get the credentials of authenticated users. Other HTTP Methods are:HEAD GET POST PUT DELETE TRACE OPTIONS CONNECT Other Arbitrary Methods are = FOOBAR JEFF CATS etc. HG PPD OC HEAD Get POST PUT Delete Options Connect Some of these methods can pose a security risk for the application as they allow an attacker to modify the files stored on the web server and in some scenarios steal the credentials of legitimate users. PUT = This method allows a client to upload new files on the web server. An attacker can exploit it by uploading malicious files. (E.g an asp file that invokes cmd.exe or by simply using the victim’s server as a file repository) DELETE = This method allows a client to delete a file on the web server. An attacker can exploit it as a simple and direct way to deface a web site or to mount a DoS attack. CONNECT = This method could allow a client to use a web server as a proxy. TRACE = This method simply echoes back to the client whatever string has been sent to the server and is used mainly for debugging purposes. This is used to mount an attack known as Cross Site Tracing which had been discovered by Jeremiah Grossman
  • 2. If an application needs one or more of these methods, such as REST Web services (which may require PUT or DELETE) it is important to check that their usage is properly limited to trusted users and safe conditions. Many frameworks and languages treat HEAD as a GET request without any body in response. If only authenticated users are allowed or a particular servlet or resource then it would be bypassed for the HEAD. Some other framework allowed arbitrary HTTP methods such as “JEFF” and CATS to be used without limitation. They were treated as if a GET method was issued. So there is a need for the code to explicitly check for a GET or POST method. Black Box Testing of HTTP Methods The OPTIONS HTTP method provides us with the most direct and effective way to do that. OPTIONS method requests for information about the communication options available on the request/resonse chain identified by the Request-URL. The testing method is extremely straightforward and we only need to fire up netcat or telnet TRACE method is used to bypass the HTTPOnly tag which forbids the javascript to access it but the TRACE method is used to bypass this protection and access the cookie. This is called Cross Site Scripting. The attacker controlled web server gets the document cookie object for hijacking the victim’ session;
  • 3. When we issue the TRACE command using telnet we get the copy of the commands issued in the end. This means that by using this an attacker can get information of cookie and then use java script though it is tagged as HTTPOnly TESTING FOR ARBRITARY HTTP METHODS Check whether the server accepts JEFF or not. If there is no issue of 405 not allowed or 501 not implemented error page then there is vulnerability. Try one of the following to exploit fully FOOBAR /admin/createUser.php?member=myAdmin JEFF /admin/changePw.php?member=myAdmin&passwd=foo123&confirm=foo123 CATS /admin/groupEdit.php?group=Admins&member=myAdmin&action=add With little luck by using the above combination we can create a new user and password can be assigned and made an admin. Testing or HEAD access control bypass Try url of a page that forces redirection to login and test this URL for HEAD request and see the response. If 302 is directed, then it is safe. If we get a 200 response then it is easy to bypass the authentication and thus authorization. If a 200 response code comes back and the response contains no
  • 4. body then it is likely that the application has processed the request without authentication and urther testing is warranted.