Web Reconnaissance
Nmap Scripts
nmap -n -p<PORT> --script http-config-backup <IP>nmap -Pn -script=http-sitemap-generator scanme.nmap.orgnmap -n -Pn -vv -O -sV --script=http-enum,http-headers,http-methods,http-title,http-vuln* 192.168.1.1nmap -n -Pn -p 80 -open -sV -vvv -script banner,http-title -iR 1000sudo nmap --script http-shellshock --script-args uri=<URL_ARCHIVO_SH> -p80 <IP>TRACE Method
Checking for Cross-Site Tracing (XST) – Bypassing HttpOnly Cookies
If
TRACEis enabled and the response reflects cookies, an attacker can bypass theHttpOnlyflag.Normally,
HttpOnlyprevents JavaScript from accessing cookies, butTRACEcan leak them if not properly restricted.
curl -X TRACE https://target.com -H "Test: XST"If the response includes the custom header,
TRACEis enabled.If it leaks
Set-Cookieheaders, it’s a serious security issue.Bug Bounty Impact: Session Hijacking
Finding Internal Headers & Debug Info
Some servers return sensitive internal headers when TRACE is enabled, such as:
X-Forwarded-For--> Real client IP leak.X-Backend-Server--> Internal server exposure.Via--> Reveals proxy setup.
curl -X TRACE https://target.comLook for unusual headers in the response.
Bug Bounty Impact:Information Disclosure
Finding WAF / Security Device Bypasses
Some
WAFsdon’t inspectTRACErequests properly.You can use
TRACEto test whetherWAFprotections apply to certain endpoints.
curl -X TRACE https://target.com/index.php --data "payload=<script>alert(1)</script>"If TRACE reflects the payload, but normal requests are blocked, the WAF is bypassable.
Checking for Cross-Origin Attacks
If
TRACEis enabled, it might allowsame-origin policy (SOP)bypasses.Some older browsers or misconfigured
CORSsetups can be exploited ifTRACEechoes requests cross-origin.
Bypass User-Agent filtering
Use
HTTPBinto check theUser-Agentfrom any client.Experiment with those
User-Agent:
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/123.0.0.0 Safari/537.36
Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:124.0) Gecko/20100101 Firefox/124.0
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/123.0.0.0 Safari/537.36 Edg/123.0.2420.81
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/123.0.0.0 Safari/537.36 OPR/109.0.0.0
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_15_7) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/123.0.0.0 Safari/537.36
Mozilla/5.0 (Macintosh; Intel Mac OS X 14.4; rv:124.0) Gecko/20100101 Firefox/124.0
Mozilla/5.0 (Macintosh; Intel Mac OS X 14_4_1) AppleWebKit/605.1.15 (KHTML, like Gecko) Version/17.4.1 Safari/605.1.15
Mozilla/5.0 (Macintosh; Intel Mac OS X 14_4_1) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/123.0.0.0 Safari/537.36 OPR/109.0.0.0
Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/123.0.0.0 Safari/537.36
Mozilla/5.0 (X11; Linux i686; rv:124.0) Gecko/20100101 Firefox/124.0Ruby Configuration Files
Worth to read the documentation
config/application.rb
config/database.ymlLast updated