SlideShare a Scribd company logo
2
Most read
4
Most read
5
Most read
HOST HEADER
INJECTION
Presenter : Amit Dubey
What are
HTTP HEADER?
• Request and Response
• Carries Information
• Browser Request
• Server Response
• HTTP Header : HOST
What is Host Header Injection ?
■ But what happens if we specify an invalid Host Header ?
■ Original Request –
■ Edited Request –
Impacts -
SEVERITY : HIGH
■ Web Cache Poisoning
■ Password Reset Poisoning
■ Cross Site Scripting
■ Access to internal hosts
Bypasses-
■ Multiple Host Headers
■ X-Forwarded-Host
Mitigation -
■ Reject any request that doesn’t match target domain
■ Validating Host header to ensure that the request is originating from that
target host or not.
■ Creating an dummy virtual host that catches all requests with unrecognized
Host headers.
■ By creating a whitelist of trusted domains.
■ Disable support for X-Forwarded-Host
QUESTION ?
~~~~~~~~~Thank you ~~~~~~~~~

More Related Content

PPTX
Attacking thru HTTP Host header
PDF
HTTP Parameter Pollution Vulnerabilities in Web Applications (Black Hat EU 2011)
PDF
Building Advanced XSS Vectors
PPT
Cross Site Request Forgery
PPTX
WAF Bypass Techniques - Using HTTP Standard and Web Servers’ Behaviour
PPT
Xss ppt
PPTX
Deep understanding on Cross-Site Scripting and SQL Injection
PPTX
SSRF exploit the trust relationship
Attacking thru HTTP Host header
HTTP Parameter Pollution Vulnerabilities in Web Applications (Black Hat EU 2011)
Building Advanced XSS Vectors
Cross Site Request Forgery
WAF Bypass Techniques - Using HTTP Standard and Web Servers’ Behaviour
Xss ppt
Deep understanding on Cross-Site Scripting and SQL Injection
SSRF exploit the trust relationship

What's hot (20)

PPTX
Understanding Cross-site Request Forgery
PDF
Ch 10: Hacking Web Servers
PDF
Windows Threat Hunting
PDF
Web App Security Presentation by Ryan Holland - 05-31-2017
PPTX
PPTX
File inclusion
PDF
Neat tricks to bypass CSRF-protection
PPTX
HTTP HOST header attacks
PDF
Introduction to Web Application Penetration Testing
PDF
Top 10 Web Application vulnerabilities
PPTX
Manual JavaScript Analysis Is A Bug
PDF
HTTP Request Smuggling via higher HTTP versions
PPTX
Vulnerabilities in modern web applications
PDF
Cross Site Scripting Going Beyond the Alert Box
PPT
Introduction to Web Application Penetration Testing
PPTX
Analysis of web application penetration testing
PPT
Cross Site Request Forgery Vulnerabilities
PDF
The Secret Life of a Bug Bounty Hunter – Frans Rosén @ Security Fest 2016
PDF
Web Application Penetration Testing
PPTX
Sql injections - with example
Understanding Cross-site Request Forgery
Ch 10: Hacking Web Servers
Windows Threat Hunting
Web App Security Presentation by Ryan Holland - 05-31-2017
File inclusion
Neat tricks to bypass CSRF-protection
HTTP HOST header attacks
Introduction to Web Application Penetration Testing
Top 10 Web Application vulnerabilities
Manual JavaScript Analysis Is A Bug
HTTP Request Smuggling via higher HTTP versions
Vulnerabilities in modern web applications
Cross Site Scripting Going Beyond the Alert Box
Introduction to Web Application Penetration Testing
Analysis of web application penetration testing
Cross Site Request Forgery Vulnerabilities
The Secret Life of a Bug Bounty Hunter – Frans Rosén @ Security Fest 2016
Web Application Penetration Testing
Sql injections - with example
Ad

Recently uploaded (20)

PPTX
Digital-Transformation-Roadmap-for-Companies.pptx
DOCX
The AUB Centre for AI in Media Proposal.docx
PPTX
VMware vSphere Foundation How to Sell Presentation-Ver1.4-2-14-2024.pptx
PDF
Encapsulation_ Review paper, used for researhc scholars
PPTX
Programs and apps: productivity, graphics, security and other tools
PDF
TokAI - TikTok AI Agent : The First AI Application That Analyzes 10,000+ Vira...
PDF
Advanced methodologies resolving dimensionality complications for autism neur...
PPTX
Spectroscopy.pptx food analysis technology
PDF
Building Integrated photovoltaic BIPV_UPV.pdf
PDF
Blue Purple Modern Animated Computer Science Presentation.pdf.pdf
PDF
Diabetes mellitus diagnosis method based random forest with bat algorithm
PDF
Architecting across the Boundaries of two Complex Domains - Healthcare & Tech...
PDF
Optimiser vos workloads AI/ML sur Amazon EC2 et AWS Graviton
PDF
Review of recent advances in non-invasive hemoglobin estimation
PDF
Unlocking AI with Model Context Protocol (MCP)
PDF
Empathic Computing: Creating Shared Understanding
PDF
Electronic commerce courselecture one. Pdf
PDF
How UI/UX Design Impacts User Retention in Mobile Apps.pdf
PPTX
Big Data Technologies - Introduction.pptx
PPTX
20250228 LYD VKU AI Blended-Learning.pptx
Digital-Transformation-Roadmap-for-Companies.pptx
The AUB Centre for AI in Media Proposal.docx
VMware vSphere Foundation How to Sell Presentation-Ver1.4-2-14-2024.pptx
Encapsulation_ Review paper, used for researhc scholars
Programs and apps: productivity, graphics, security and other tools
TokAI - TikTok AI Agent : The First AI Application That Analyzes 10,000+ Vira...
Advanced methodologies resolving dimensionality complications for autism neur...
Spectroscopy.pptx food analysis technology
Building Integrated photovoltaic BIPV_UPV.pdf
Blue Purple Modern Animated Computer Science Presentation.pdf.pdf
Diabetes mellitus diagnosis method based random forest with bat algorithm
Architecting across the Boundaries of two Complex Domains - Healthcare & Tech...
Optimiser vos workloads AI/ML sur Amazon EC2 et AWS Graviton
Review of recent advances in non-invasive hemoglobin estimation
Unlocking AI with Model Context Protocol (MCP)
Empathic Computing: Creating Shared Understanding
Electronic commerce courselecture one. Pdf
How UI/UX Design Impacts User Retention in Mobile Apps.pdf
Big Data Technologies - Introduction.pptx
20250228 LYD VKU AI Blended-Learning.pptx
Ad

Host Header injection - Slides

  • 2. What are HTTP HEADER? • Request and Response • Carries Information • Browser Request • Server Response • HTTP Header : HOST
  • 3. What is Host Header Injection ? ■ But what happens if we specify an invalid Host Header ? ■ Original Request – ■ Edited Request –
  • 4. Impacts - SEVERITY : HIGH ■ Web Cache Poisoning ■ Password Reset Poisoning ■ Cross Site Scripting ■ Access to internal hosts
  • 5. Bypasses- ■ Multiple Host Headers ■ X-Forwarded-Host
  • 6. Mitigation - ■ Reject any request that doesn’t match target domain ■ Validating Host header to ensure that the request is originating from that target host or not. ■ Creating an dummy virtual host that catches all requests with unrecognized Host headers. ■ By creating a whitelist of trusted domains. ■ Disable support for X-Forwarded-Host