Full Disclosure mailing list archives
Re: IPS Evasion with the Apache HTTP Server
From: coderman <coderman () gmail com>
Date: Tue, 19 Jun 2007 12:44:00 -0700
On 6/19/07, H D Moore <fdlist () digitaloffense net> wrote:
... Many commercial IPS products fail to decode HTTP requests which use 0x0c, 0x0b, and 0x0d instead of the normal 0x20/0x09 separators. ... A request which contains multiple CRLF sequences instead of a valid method is processed by Apache, yet ignored by most IPS engines
you can use many more than that. fill spaces with non printable and apache (and a few others) will eat it fine. \x01-\x1f, except ESC, maybe CR/LF depending on placement... is there a page somewhere that details which web servers handle sloppy input? (i bet the embedded httpd's are the most resistant) _______________________________________________ Full-Disclosure - We believe in it. Charter: http://lists.grok.org.uk/full-disclosure-charter.html Hosted and sponsored by Secunia - http://secunia.com/
Current thread:
- IPS Evasion with the Apache HTTP Server H D Moore (Jun 19)
- Re: IPS Evasion with the Apache HTTP Server coderman (Jun 19)
- Re: IPS Evasion with the Apache HTTP Server Valdis . Kletnieks (Jun 19)
- Re: IPS Evasion with the Apache HTTP Server coderman (Jun 19)
- Re: IPS Evasion with the Apache HTTP Server Valdis . Kletnieks (Jun 19)
- Re: IPS Evasion with the Apache HTTP Server 3APA3A (Jun 20)
- Re: IPS Evasion with the Apache HTTP Server Jamie Riden (Jun 20)
- Re: IPS Evasion with the Apache HTTP Server 3APA3A (Jun 20)
- Re: IPS Evasion with the Apache HTTP Server H D Moore (Jun 20)
- Re: IPS Evasion with the Apache HTTP Server H D Moore (Jun 20)
- Re: IPS Evasion with the Apache HTTP Server Jamie Riden (Jun 20)
- Re: IPS Evasion with the Apache HTTP Server coderman (Jun 19)