Why HTTP Testing?
The HTTP methods can be used or nefarious purposes if the web server is mis-cofigured. Additionally
Cross Site Tracing (XST), a form of cross site scripting using the server’s HTTP TRACE method, is used by
attackers to get the credentials of authenticated users.
Other HTTP Methods are:HEAD
GET
POST
PUT
DELETE
TRACE
OPTIONS
CONNECT
Other Arbitrary Methods are = FOOBAR JEFF CATS etc.
HG PPD OC
HEAD Get POST PUT Delete Options Connect
Some of these methods can pose a security risk for the application as they allow an attacker to modify
the files stored on the web server and in some scenarios steal the credentials of legitimate users.
PUT = This method allows a client to upload new files on the web server. An attacker can exploit it by
uploading malicious files. (E.g an asp file that invokes cmd.exe or by simply using the victim’s server as a
file repository)
DELETE = This method allows a client to delete a file on the web server. An attacker can exploit it as a
simple and direct way to deface a web site or to mount a DoS attack.
CONNECT = This method could allow a client to use a web server as a proxy.
TRACE = This method simply echoes back to the client whatever string has been sent to the server and is
used mainly for debugging purposes. This is used to mount an attack known as Cross Site Tracing which
had been discovered by Jeremiah Grossman
If an application needs one or more of these methods, such as REST Web services (which may require
PUT or DELETE) it is important to check that their usage is properly limited to trusted users and safe
conditions.
Many frameworks and languages treat HEAD as a GET request without any body in response. If only
authenticated users are allowed or a particular servlet or resource then it would be bypassed for the
HEAD.
Some other framework allowed arbitrary HTTP methods such as “JEFF” and CATS to be used without
limitation. They were treated as if a GET method was issued.
So there is a need for the code to explicitly check for a GET or POST method.
Black Box Testing of HTTP Methods

The OPTIONS HTTP method provides us with the most direct and effective way to do that. OPTIONS
method requests for information about the communication options available on the request/resonse
chain identified by the Request-URL.
The testing method is extremely straightforward and we only need to fire up netcat or telnet

TRACE method is used to bypass the HTTPOnly tag which forbids the javascript to access it but the
TRACE method is used to bypass this protection and access the cookie. This is called Cross Site Scripting.
The attacker controlled web server gets the document cookie object for hijacking the victim’ session;
When we issue the TRACE command using telnet we get the copy of the commands issued in the end.
This means that by using this an attacker can get information of cookie and then use java script though it
is tagged as HTTPOnly
TESTING FOR ARBRITARY HTTP METHODS

Check whether the server accepts JEFF or not. If there is no issue of 405 not allowed or 501 not
implemented error page then there is vulnerability.
Try one of the following to exploit fully
FOOBAR /admin/createUser.php?member=myAdmin
JEFF /admin/changePw.php?member=myAdmin&passwd=foo123&confirm=foo123
CATS /admin/groupEdit.php?group=Admins&member=myAdmin&action=add
With little luck by using the above combination we can create a new user and password can be assigned
and made an admin.

Testing or HEAD access control bypass

Try url of a page that forces redirection to login and test this URL for HEAD request and see the
response. If 302 is directed, then it is safe. If we get a 200 response then it is easy to bypass the
authentication and thus authorization. If a 200 response code comes back and the response contains no
body then it is likely that the application has processed the request without authentication and urther
testing is warranted.

More Related Content

PPT
Fundamentals of cryptography
PPTX
Web Security and SSL - Secure Socket Layer
PPTX
Cryptography
PPT
Security attacks
PDF
The future of crypto wallets
PPT
Firewall Architecture
PPTX
Ssl and tls
PPTX
Suspicious Email Detection
Fundamentals of cryptography
Web Security and SSL - Secure Socket Layer
Cryptography
Security attacks
The future of crypto wallets
Firewall Architecture
Ssl and tls
Suspicious Email Detection

What's hot (20)

PPT
Congetion Control.pptx
PPT
Requirment anlaysis , application, device, network requirements
PPTX
Credit Card Fraudulent Transaction Detection Research Paper
PPTX
Virtual Private Networks (VPN) ppt
PPT
The constrained application protocol (CoAP)
PPTX
Network security model.pptx
PPTX
Topic20 The RC4 Algorithm.pptx
PDF
Email security presentation
PPTX
Synchronous and Asynchronous Transmission
PPTX
Introduction to data link layer
PPTX
Credit card fraud detection using python machine learning
PPTX
Blockchain Tokenization
PPTX
Substitution techniques
DOCX
Pharmacy management system
PPTX
Encryption algorithms
PPTX
Hash Function
PPTX
Internet of Things: Protocols for M2M
PPTX
Computer Networks - Error Detection & Error Correction
PDF
Liit tyit sem 5 advanced web programming unit 1 most important questions with...
Congetion Control.pptx
Requirment anlaysis , application, device, network requirements
Credit Card Fraudulent Transaction Detection Research Paper
Virtual Private Networks (VPN) ppt
The constrained application protocol (CoAP)
Network security model.pptx
Topic20 The RC4 Algorithm.pptx
Email security presentation
Synchronous and Asynchronous Transmission
Introduction to data link layer
Credit card fraud detection using python machine learning
Blockchain Tokenization
Substitution techniques
Pharmacy management system
Encryption algorithms
Hash Function
Internet of Things: Protocols for M2M
Computer Networks - Error Detection & Error Correction
Liit tyit sem 5 advanced web programming unit 1 most important questions with...
Ad

Similar to Testing http methods using Telnet (20)

DOCX
Study of http
PPT
Anintroductiontojavawebtechnology 090324184240-phpapp01
PPTX
ASP.NET WEB API Training
PPTX
SOAP vs REST
ODP
Servlets
PPT
Servlets
PDF
HTTP Basics Demo
PPTX
Proxy log review and use cases
PDF
HTTPs Strict Transport Security
PDF
Web Component Development Using Servlet & JSP Technologies (EE6) - Chapter 4...
PDF
Webappcontrol for Information Technology
PPT
An Introduction To Java Web Technology
PPTX
Conquering CORS. Taming Cross-Origin Resource Sharing.
PPT
Webbasics
PPTX
PPT
Web Tech Java Servlet Update1
PPT
UserCentric Identity based Service Invocation
PPTX
Software performance testing_overview
PPT
Web Services Security
PPT
Identifying Web Servers: A First-look Into the Future of Web Server Fingerpri...
Study of http
Anintroductiontojavawebtechnology 090324184240-phpapp01
ASP.NET WEB API Training
SOAP vs REST
Servlets
Servlets
HTTP Basics Demo
Proxy log review and use cases
HTTPs Strict Transport Security
Web Component Development Using Servlet & JSP Technologies (EE6) - Chapter 4...
Webappcontrol for Information Technology
An Introduction To Java Web Technology
Conquering CORS. Taming Cross-Origin Resource Sharing.
Webbasics
Web Tech Java Servlet Update1
UserCentric Identity based Service Invocation
Software performance testing_overview
Web Services Security
Identifying Web Servers: A First-look Into the Future of Web Server Fingerpri...
Ad

More from Sunil Kumar Gunasekaran (20)

DOCX
CQL - Cassandra commands Notes
DOCX
Java J2EE Complete Syllabus Checklist
PDF
Amazon search test case document
DOC
Actual test case document
DOC
Sample Technical Requirement Document (TRD)
DOCX
Sql reference from w3 schools
DOCX
Sql commands worked out in sql plus with screen shots
DOCX
Wells fargo banking system ER Diagram
DOC
Business Requirements Document for Acounts Payable System
DOCX
Automation Testing Syllabus - Checklist
DOCX
Unix made easy
PDF
Test process - Important Concepts
PDF
Test Life Cycle - Presentation - Important concepts covered
DOCX
Scrum writeup - Agile
DOCX
Scrum, V Model and RUP Models Overview
DOCX
PERL for QA - Important Commands and applications
DOCX
JAVA Notes - All major concepts covered with examples
DOCX
Java programs - bubble sort, iterator, linked list, hash set, reverse string,...
DOCX
Fitnesse user acceptance test - Presentation
CQL - Cassandra commands Notes
Java J2EE Complete Syllabus Checklist
Amazon search test case document
Actual test case document
Sample Technical Requirement Document (TRD)
Sql reference from w3 schools
Sql commands worked out in sql plus with screen shots
Wells fargo banking system ER Diagram
Business Requirements Document for Acounts Payable System
Automation Testing Syllabus - Checklist
Unix made easy
Test process - Important Concepts
Test Life Cycle - Presentation - Important concepts covered
Scrum writeup - Agile
Scrum, V Model and RUP Models Overview
PERL for QA - Important Commands and applications
JAVA Notes - All major concepts covered with examples
Java programs - bubble sort, iterator, linked list, hash set, reverse string,...
Fitnesse user acceptance test - Presentation

Recently uploaded (20)

PDF
Empowerment Technology for Senior High School Guide
PDF
International_Financial_Reporting_Standa.pdf
PDF
Environmental Education MCQ BD2EE - Share Source.pdf
PDF
BP 704 T. NOVEL DRUG DELIVERY SYSTEMS (UNIT 1)
PDF
FORM 1 BIOLOGY MIND MAPS and their schemes
PDF
HVAC Specification 2024 according to central public works department
PDF
Τίμαιος είναι φιλοσοφικός διάλογος του Πλάτωνα
PDF
Hazard Identification & Risk Assessment .pdf
PDF
English Textual Question & Ans (12th Class).pdf
PDF
advance database management system book.pdf
PDF
semiconductor packaging in vlsi design fab
PDF
LIFE & LIVING TRILOGY - PART - (2) THE PURPOSE OF LIFE.pdf
PDF
Paper A Mock Exam 9_ Attempt review.pdf.
PDF
1.3 FINAL REVISED K-10 PE and Health CG 2023 Grades 4-10 (1).pdf
PPTX
B.Sc. DS Unit 2 Software Engineering.pptx
PDF
Race Reva University – Shaping Future Leaders in Artificial Intelligence
PDF
medical_surgical_nursing_10th_edition_ignatavicius_TEST_BANK_pdf.pdf
PPTX
Module on health assessment of CHN. pptx
PDF
David L Page_DCI Research Study Journey_how Methodology can inform one's prac...
PDF
MBA _Common_ 2nd year Syllabus _2021-22_.pdf
Empowerment Technology for Senior High School Guide
International_Financial_Reporting_Standa.pdf
Environmental Education MCQ BD2EE - Share Source.pdf
BP 704 T. NOVEL DRUG DELIVERY SYSTEMS (UNIT 1)
FORM 1 BIOLOGY MIND MAPS and their schemes
HVAC Specification 2024 according to central public works department
Τίμαιος είναι φιλοσοφικός διάλογος του Πλάτωνα
Hazard Identification & Risk Assessment .pdf
English Textual Question & Ans (12th Class).pdf
advance database management system book.pdf
semiconductor packaging in vlsi design fab
LIFE & LIVING TRILOGY - PART - (2) THE PURPOSE OF LIFE.pdf
Paper A Mock Exam 9_ Attempt review.pdf.
1.3 FINAL REVISED K-10 PE and Health CG 2023 Grades 4-10 (1).pdf
B.Sc. DS Unit 2 Software Engineering.pptx
Race Reva University – Shaping Future Leaders in Artificial Intelligence
medical_surgical_nursing_10th_edition_ignatavicius_TEST_BANK_pdf.pdf
Module on health assessment of CHN. pptx
David L Page_DCI Research Study Journey_how Methodology can inform one's prac...
MBA _Common_ 2nd year Syllabus _2021-22_.pdf

Testing http methods using Telnet

  • 1. Why HTTP Testing? The HTTP methods can be used or nefarious purposes if the web server is mis-cofigured. Additionally Cross Site Tracing (XST), a form of cross site scripting using the server’s HTTP TRACE method, is used by attackers to get the credentials of authenticated users. Other HTTP Methods are:HEAD GET POST PUT DELETE TRACE OPTIONS CONNECT Other Arbitrary Methods are = FOOBAR JEFF CATS etc. HG PPD OC HEAD Get POST PUT Delete Options Connect Some of these methods can pose a security risk for the application as they allow an attacker to modify the files stored on the web server and in some scenarios steal the credentials of legitimate users. PUT = This method allows a client to upload new files on the web server. An attacker can exploit it by uploading malicious files. (E.g an asp file that invokes cmd.exe or by simply using the victim’s server as a file repository) DELETE = This method allows a client to delete a file on the web server. An attacker can exploit it as a simple and direct way to deface a web site or to mount a DoS attack. CONNECT = This method could allow a client to use a web server as a proxy. TRACE = This method simply echoes back to the client whatever string has been sent to the server and is used mainly for debugging purposes. This is used to mount an attack known as Cross Site Tracing which had been discovered by Jeremiah Grossman
  • 2. If an application needs one or more of these methods, such as REST Web services (which may require PUT or DELETE) it is important to check that their usage is properly limited to trusted users and safe conditions. Many frameworks and languages treat HEAD as a GET request without any body in response. If only authenticated users are allowed or a particular servlet or resource then it would be bypassed for the HEAD. Some other framework allowed arbitrary HTTP methods such as “JEFF” and CATS to be used without limitation. They were treated as if a GET method was issued. So there is a need for the code to explicitly check for a GET or POST method. Black Box Testing of HTTP Methods The OPTIONS HTTP method provides us with the most direct and effective way to do that. OPTIONS method requests for information about the communication options available on the request/resonse chain identified by the Request-URL. The testing method is extremely straightforward and we only need to fire up netcat or telnet TRACE method is used to bypass the HTTPOnly tag which forbids the javascript to access it but the TRACE method is used to bypass this protection and access the cookie. This is called Cross Site Scripting. The attacker controlled web server gets the document cookie object for hijacking the victim’ session;
  • 3. When we issue the TRACE command using telnet we get the copy of the commands issued in the end. This means that by using this an attacker can get information of cookie and then use java script though it is tagged as HTTPOnly TESTING FOR ARBRITARY HTTP METHODS Check whether the server accepts JEFF or not. If there is no issue of 405 not allowed or 501 not implemented error page then there is vulnerability. Try one of the following to exploit fully FOOBAR /admin/createUser.php?member=myAdmin JEFF /admin/changePw.php?member=myAdmin&passwd=foo123&confirm=foo123 CATS /admin/groupEdit.php?group=Admins&member=myAdmin&action=add With little luck by using the above combination we can create a new user and password can be assigned and made an admin. Testing or HEAD access control bypass Try url of a page that forces redirection to login and test this URL for HEAD request and see the response. If 302 is directed, then it is safe. If we get a 200 response then it is easy to bypass the authentication and thus authorization. If a 200 response code comes back and the response contains no
  • 4. body then it is likely that the application has processed the request without authentication and urther testing is warranted.