1. HTTP verb Tampering
1. Identifying Protected Pages (Basic Authentication Bypass)
Using curl to Check for Authentication Prompts
curl -i http://target.com/admin/reset.php
curl -i http://target.com/admin/Using Burp Suite to Intercept and Examine Requests
2. Identifying Allowed HTTP Methods
Using curl to Send OPTIONS Request
curl -i -X OPTIONS http://target.com/admin/reset.phpUsing Netcat to Check Allowed Methods
nc -nv target.com 80
OPTIONS / HTTP/1.1
Host: target.com3. Exploiting Authentication Bypass
Using HEAD Method for Bypass
Bypassing Security Filters by Changing HTTP Method
Testing Command Injection After Bypass
4. Insecure Web Server Configurations
Vulnerable Apache Configuration
Vulnerable Tomcat Configuration
Vulnerable ASP.NET Configuration
5. Testing for SQL Injection with SQLmap
6. Fuzzing HTTP Methods
Using wfuzz
7. Web Scanning and Reconnaissance
Nmap (Port Scanning)
Nikto (Web Server Scanning)
Gobuster (Directory Bruteforce)
8. Burp Suite Tools Overview
9. HTTP Verb Tampering Overview
Common HTTP Verbs
Causes of Vulnerabilities
Example of Insecure Coding (PHP)
10. Prevention Strategies
Key Takeaways
Last updated