Penetration Testing mailing list archives
RE: Entity tags as an HTTP covert channel
From: "Bob Auger" <bauger () spidynamics com>
Date: Fri, 2 Jun 2006 10:42:01 -0400
By combining this with partial downloads using Byte-range and 206
headers, randomizing filenames in the request (using a dictionary) and actual
files containing semi-random content being returned, this can be made
to look very innocuous in the proxy's logs. By using randomized Byte-range's you'll also be able to fool many Web Application Firewalls, and IDS systems flagging on response signature based vulnerabilities. Regards, Robert Auger SPI Labs rauger@_@_ () spidynamics com Start Secure. Stay Secure. Security Assurance Throughout the Application Lifecycle ------------------------------------------------------------------------------ This List Sponsored by: Cenzic Concerned about Web Application Security? Why not go with the #1 solution - Cenzic, the only one to win the Analyst's Choice Award from eWeek. As attacks through web applications continue to rise, you need to proactively protect your applications from hackers. Cenzic has the most comprehensive solutions to meet your application security penetration testing and vulnerability management needs. You have an option to go with a managed service (Cenzic ClickToSecure) or an enterprise software (Cenzic Hailstorm). Download FREE whitepaper on how a managed service can help you: http://www.cenzic.com/news_events/wpappsec.php And, now for a limited time we can do a FREE audit for you to confirm your results from other product. Contact us at request () cenzic com for details. ------------------------------------------------------------------------------
Current thread:
- Entity tags as an HTTP covert channel Maarten Van Horenbeeck (Jun 01)
- RE: Entity tags as an HTTP covert channel Bob Auger (Jun 02)
- Re: Entity tags as an HTTP covert channel Maarten Van Horenbeeck (Jun 02)
- RE: Entity tags as an HTTP covert channel Bob Auger (Jun 02)